Skip to content

Browse through our collection of vulnerabilities images and stock photos. They are all royalty-free and ready to use for your next project.

Price is in US dollars and excludes tax and handling fees
Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

$5
Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

$5
colored paper with the words deep analysis, vulnerability discovery, and patch creation.

colored paper with the words deep analysis, vulnerability discovery, and patch creation.

$5
Startup IT expert looking for company security vulnerabilities while listening music

Startup IT expert looking for company security vulnerabilities while listening music

$10
Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

$5
Professional cyber security team working to prevent security threats, find vulnerability and solve

Professional cyber security team working to prevent security threats, find vulnerability and solve

by kjekol
$4
Young woman expressing vulnerability and strength through pose in a minimalist setting

Young woman expressing vulnerability and strength through pose in a minimalist setting

$5
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$5
Female worker in manufactury feeling vulnerable and intimidated by superior manager, forced touching

Female worker in manufactury feeling vulnerable and intimidated by superior manager, forced touching

$5
Young woman demonstrates beauty and vulnerability while facing struggles with anorexia

Young woman demonstrates beauty and vulnerability while facing struggles with anorexia

$5
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Portrait of sick vulnerable alone little child looking into camera while crying

Portrait of sick vulnerable alone little child looking into camera while crying

$9
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Lonely, traumatised, frustrated, ill woman holding head in hands, feeling vulnerable

Lonely, traumatised, frustrated, ill woman holding head in hands, feeling vulnerable

$10
Seated woman by the lake, fully present in the moment, expressing peaceful vulnerability. Highlights

Seated woman by the lake, fully present in the moment, expressing peaceful vulnerability. Highlights

by yavdat
$5
Cyber security hacker code malware to exploit vulnerability in program or system on a computer in a

Cyber security hacker code malware to exploit vulnerability in program or system on a computer in a

by kjekol
$4
Back view of analysts working on vulnerability of computer systems with charts on computer monitors

Back view of analysts working on vulnerability of computer systems with charts on computer monitors

$5
Lonely, traumatised, frustrated, ill woman holding head in hands, feeling vulnerable

Lonely, traumatised, frustrated, ill woman holding head in hands, feeling vulnerable

$10
African american vulnerable trooper opening up about horror war scenes

African american vulnerable trooper opening up about horror war scenes

$10
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Lonely, traumatised, frustrated, ill woman holding head in hands, feeling vulnerable

Lonely, traumatised, frustrated, ill woman holding head in hands, feeling vulnerable

$9
Depressed woman lying alone on sofa feeling tired vulnerable weak crying

Depressed woman lying alone on sofa feeling tired vulnerable weak crying

$9
Hacker using AI tech to target vulnerable unpatched connections to steal data

Hacker using AI tech to target vulnerable unpatched connections to steal data

$10
Female worker in manufactury feeling vulnerable and intimidated by superior manager, forced touching

Female worker in manufactury feeling vulnerable and intimidated by superior manager, forced touching

$5
Female worker in manufactury feeling vulnerable and intimidated by superior manager, forced touching

Female worker in manufactury feeling vulnerable and intimidated by superior manager, forced touching

$5