They need to sound way scarier than that, though.
BONECRUSH: Buffer Overrun Neatly Exceeds Current Reusable User Storage Hindrances
FACENEEDLE: Foreign Actors Can Execute Nefarious Executables, Even During Lockdown... Exploit
HELLSCREAM: Hack Exploiting Lazy Loading Standard Core Runtime Executables And Modules
VIRTUALIZED ENVIRONMENT NEGLECTED OPERATIONS MANIPULATION VENOM seriously, kinda reminds me of:
Ward: Strategic Homeland Intervention, Enforcement and Logistics Division.
Hill: And what does that mean to you?
Ward: It means someone really wanted our initials to spell out "SHIELD."
At least heartbleed and shellshock were kinda properly named, this one is a hell of a stretch.
Inb4 people start registering silly domains that can be used to spell out vulnerabilities.
CITRUS: Channel Insecure Transport Releases User Sessions
TBONE: Transmission Buffer Overflow Network Exploitation
BUTTER: Buffer Underrun Transactional Execution Relay
Let the parking wars begin!