Skip to content

Browse through our collection of vulnerabilities images and stock photos. They are all royalty-free and ready to use for your next project.

Price is in US dollars and excludes tax and handling fees
Vulnerable in vintage

Vulnerable in vintage

$5
Smartphone in hand Security Vulnerability Log4J. Security vulnerability Log4j.

Smartphone in hand Security Vulnerability Log4J. Security vulnerability Log4j.

$5
Vulnerable and beaten woman

Vulnerable and beaten woman

$10
Hackers identifying system vulnerability

Hackers identifying system vulnerability

$10
Vulnerable young woman

Vulnerable young woman

$10
System administrator fixing vulnerabilities in software

System administrator fixing vulnerabilities in software

$10
Medical workers are the most vulnerable!

Medical workers are the most vulnerable!

$5
Animals are totally vulnerable they are dependent on us

Animals are totally vulnerable they are dependent on us

$5
Programmer with frown on face trying to fix vulnerabilities

Programmer with frown on face trying to fix vulnerabilities

$10
Programmer using tablet to fix vulnerabilities compromising systems

Programmer using tablet to fix vulnerabilities compromising systems

$10
IT developer drinking coffee while fixing vulnerabilities in software

IT developer drinking coffee while fixing vulnerabilities in software

$10
IT programmer listening music while fixing vulnerabilities in software

IT programmer listening music while fixing vulnerabilities in software

$10
Programmer using tablet to fix vulnerabilities compromising systems

Programmer using tablet to fix vulnerabilities compromising systems

$10
Pensive IT engineer thinking of ways to fix vulnerabilities in software

Pensive IT engineer thinking of ways to fix vulnerabilities in software

$10
Desperate vulnerable stressed lonely man with headache

Desperate vulnerable stressed lonely man with headache

$9
A group of Cape vultures, a species listed as vulnerable

A group of Cape vultures, a species listed as vulnerable

$7
Engineer in server farm auditing systems for vulnerabilities

Engineer in server farm auditing systems for vulnerabilities

$10
Ecstatic cybersecurity expert celebrating after finding security vulnerabilities

Ecstatic cybersecurity expert celebrating after finding security vulnerabilities

$10
Joyful cybersecurity expert happy after finding security vulnerabilities

Joyful cybersecurity expert happy after finding security vulnerabilities

$10
Cybersecurity expert using laptop to look for company security vulnerabilities

Cybersecurity expert using laptop to look for company security vulnerabilities

$10
IT engineer fixing vulnerabilities in software enabling hackers to compromise PC

IT engineer fixing vulnerabilities in software enabling hackers to compromise PC

$10
Programmer typing on laptop to fix system vulnerabilities, close up

Programmer typing on laptop to fix system vulnerabilities, close up

$10
Smiling cybersecurity expert pleased after finding security vulnerabilities

Smiling cybersecurity expert pleased after finding security vulnerabilities

$10
Worried system administrator stressed after finding security vulnerabilities

Worried system administrator stressed after finding security vulnerabilities

$10
Protect vulnerable people from the coronavirus social banner

Protect vulnerable people from the coronavirus social banner

$5
Protect vulnerable people from the coronavirus social banner

Protect vulnerable people from the coronavirus social banner

$5
Vulnerable brown bear lying near the tree in autumn

Vulnerable brown bear lying near the tree in autumn

$5
Vulnerable adult traumatized unhappy alone in pain couple

Vulnerable adult traumatized unhappy alone in pain couple

$10
Vulnerable adult traumatized unhappy alone in pain couple

Vulnerable adult traumatized unhappy alone in pain couple

$10
Cybersecurity expert leaves home office after finding security vulnerabilities

Cybersecurity expert leaves home office after finding security vulnerabilities

$10