13.5.2.1. It's been mentioned in a CERT-CC advisory or on a web site listing vulnerabilities
CERT-CC issues advisories for programs that are supposed to be
secure, but that have known problems for which fixes are available
from the supplier. While it's always unfortunate to have a
problem show up, if there's a CERT-CC advisory for it, at least
you know that the problem was unintentional and the vendor has taken
steps to fix it. A program with no CERT-CC advisories might have no
problems; but it might also be completely insecure by design, be
distributed by a vendor who never fixes security problems, or have
problems that were never reported to CERT-CC. Since CERT-CC is
relatively inactive outside of the Unix world, problems on non-Unix
platforms are less likely to show up there, but they still exist.
Other lists of vulnerabilities are often a better reflection of
actual risks, since they will list problems that the vendor has
chosen to ignore and problems that are there by design. On the other
hand, they're still very much a popularity contest. The
"exploit lists" kept by attackers, and people trying to
keep up with them, focus heavily on attacks that provide the most
compromises for the least effort. That means that popular programs
are mentioned often, and unpopular programs don't get much
publicity, even if the popular programs are much more secure than the
unpopular ones.
In addition, people who use this argument often provide big scary
numbers without putting them in context; what does it mean if you say
that a given web site lists 27 vulnerabilities in a program? If the
web site is carefully run by a single administrator, that might be 27
separate vulnerabilities; if it's not, it may be the same 9
vulnerabilities reported three times each. In either case, it's
not very interesting if competing programs have 270!