Content deleted Content added
GreenC bot (talk | contribs) Move 1 url. Wayback Medic 2.5 per WP:URLREQ#social.techcrunch.com |
tag fv |
||
Line 1:
{{Short description|Compromising a computer system}}
An '''exploit''' (from the English verb ''to exploit'', meaning "to use something to one’s own advantage") is a piece of [[software]], a chunk of [[data]], or a sequence of commands that takes advantage of a [[software bug|bug]] or [[vulnerability (computer science)|vulnerability]] to cause unintended or unanticipated behavior to occur on [[Software|computer software]], hardware, or something electronic (usually computerized).<ref>{{Cite web|title=exploit - Definition|url=https://www.trendmicro.com/vinfo/us/security/definition/exploit|access-date=2021-09-04|website=www.trendmicro.com}}</ref>{{Failed verification | date = August 2024 | reason = You can't make up this definition from the reference, especially relating to 'data' or 'computerized electronics'}} Such behavior frequently includes gaining control of a computer system, allowing [[privilege escalation]], or a [[denial-of-service attack|denial-of-service (DoS or related DDoS) attack]]. In lay terms, some exploit is akin to a '[[security hacker|hack]]'.
==Classification==
|