Skip to content

Vulnerable Stock Photos & Royalty-Free Images

All the stock photos you need and more from our global creative community.

Price is in US dollars and excludes tax and handling fees

2,476 stock photos

Clear all
Pensive IT engineer thinking of ways to fix vulnerabilities in software

Pensive IT engineer thinking of ways to fix vulnerabilities in software

$10
Vulnerable beauty: man embracing his dental routine

Vulnerable beauty: man embracing his dental routine

$5
Soldier in a vulnerable state crying and seeking mental health support

Soldier in a vulnerable state crying and seeking mental health support

$10
Programmer using tablet to fix vulnerabilities compromising systems

Programmer using tablet to fix vulnerabilities compromising systems

$10
Scared, traumatized, vulnerable, shocked man unwilling to stop crying

Scared, traumatized, vulnerable, shocked man unwilling to stop crying

$10
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$5
Programmer using tablet to fix vulnerabilities compromising systems

Programmer using tablet to fix vulnerabilities compromising systems

$10
Hackers using network vulnerability to exploit security server

Hackers using network vulnerability to exploit security server

$10
Young woman feeling vulnerable and lonely in blue light

Young woman feeling vulnerable and lonely in blue light

$5
Spies using system vulnerability to exploit and break server

Spies using system vulnerability to exploit and break server

$10
IT programmer listening music while fixing vulnerabilities in software

IT programmer listening music while fixing vulnerabilities in software

$10
Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

$5
IT developer drinking coffee while fixing vulnerabilities in software

IT developer drinking coffee while fixing vulnerabilities in software

$10
Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

$5
Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

Polar bears in the wild. A powerful predator and a vulnerable or potentially endangered species.

$5
Vulnerable Encounter: Nurse Examines Patient in Hospital Gown

Vulnerable Encounter: Nurse Examines Patient in Hospital Gown

$5
Woman posing with arms up showing vulnerability and defiance

Woman posing with arms up showing vulnerability and defiance

$5
IT engineer fixing vulnerabilities in software enabling hackers to compromise PC

IT engineer fixing vulnerabilities in software enabling hackers to compromise PC

$10
Feeling vulnerable. Rearview studio shot of a woman kneeling in underwear.

Feeling vulnerable. Rearview studio shot of a woman kneeling in underwear.

$5
Ecstatic cybersecurity expert celebrating after finding security vulnerabilities

Ecstatic cybersecurity expert celebrating after finding security vulnerabilities

$10
Diverse people using trojan virus to exploit server vulnerability

Diverse people using trojan virus to exploit server vulnerability

$10
Smiling cybersecurity expert pleased after finding security vulnerabilities

Smiling cybersecurity expert pleased after finding security vulnerabilities

$10
Joyful cybersecurity expert happy after finding security vulnerabilities

Joyful cybersecurity expert happy after finding security vulnerabilities

$10
Chip vulnerability. Security issues. Disruptions in the supply of microchips and semiconductors

Chip vulnerability. Security issues. Disruptions in the supply of microchips and semiconductors

by iLixe48
$5
Cybersecurity expert using laptop to look for company security vulnerabilities

Cybersecurity expert using laptop to look for company security vulnerabilities

$10
Worried system administrator stressed after finding security vulnerabilities

Worried system administrator stressed after finding security vulnerabilities

$10
Male thief exploiting server vulnerability and breaking into firewall encryption

Male thief exploiting server vulnerability and breaking into firewall encryption

$10
Programmer typing on laptop to fix system vulnerabilities, close up

Programmer typing on laptop to fix system vulnerabilities, close up

$10
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$8
Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

Therapy with its emphasis on vulnerable face-to-face sharing, presents challenges for men

$5