image4 Published October 25, 2018 at 1265 × 712 in The Good, the Bad, and the Weird ← Previous Next → A vulnerability is used to alter either program execution or data state. Execution after this is either a weird state or a state operating on unintended data.