{"version":"1.0","provider_name":"Firewalls.com","provider_url":"https:\/\/www.firewalls.com\/blog","author_name":"Rafi Chowdhury","author_url":"https:\/\/www.firewalls.com\/blog\/author\/crashdi\/","title":"Vulnerability - Firewalls.com","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"jwGo51pyKp\"><a href=\"https:\/\/www.firewalls.com\/blog\/security-terms\/vulnerability\/\">Vulnerability<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.firewalls.com\/blog\/security-terms\/vulnerability\/embed\/#?secret=jwGo51pyKp\" width=\"600\" height=\"338\" title=\"&#8220;Vulnerability&#8221; &#8212; Firewalls.com\" data-secret=\"jwGo51pyKp\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.firewalls.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","description":"What is a Vulnerability? A Vulnerability is a flaw or bug in a software application that can be exploited by hackers. Vulnerabilities are commonplace in the software industry with hackers continually looking for new ones to take advantage of. How to Recognize This Threat: Companies often pay researchers to identify vulnerabilities, while others are not [&hellip;]"}