Some of those bugs introduce security holes. By this I mean something very specific: an attacker can deliberately trigger the bug to achieve some effect undesired by the code’s designers and programmers. In computer security language, we call these bugs “vulnerabilities.”

