A piece of code, technique, or method that takes advantage of a vulnerability to compromise a system. Exploits can be delivered through malicious websites, email attachments, or network attacks.
Related Terms
Malware
malwareMalicious software designed to damage, disrupt, or gain unauthorized access to computer systems. Malware includes viruse...
Vulnerability
generalA weakness in a system, application, or process that can be exploited by a threat actor to gain unauthorized access or c...
Zero-Day
generalA previously unknown vulnerability that is exploited before the software vendor is aware of it or has released a patch....