How do vulnerabilities get into software?

Related topics: