In software, they arise when someone develops a company's online maps, calendars, photos, searchengines and other products, usually through relatively small amounts of code that is posted on the Internet.
Cybercriminals and security researchers have used searchengines, including Google, for years to scour the Web for instances of outdated code open to intrusions.