(Source: Graham Cluley Security News) Of course, not all software flaws qualify. Those with no security impact, that require a physical connection to a device, or that necessitate extensive user …