About us
Define
Definitions for
"zero-day exploit"
Keywords:
vulnerability
,
exploit
,
announced
,
hasn't
,
advantage
Related Terms:
Exploit
,
Malware
,
Anti-spyware software
,
Spyware
,
Keyloggers
,
Keylogger
,
Key logger
,
Scumware
,
Trojan
,
Trojan horse
,
Hack
,
Keystroke logger
,
Trojans
,
Trojan horse
,
Vulnerability
,
Malicious code
,
Trojan horses
,
Hack
,
Rootkit
,
Adware
,
Script kiddie
,
Covert
,
Hack
,
Rogue program
,
Trojan
,
Easter egg
,
Backdoor
,
Payload
,
Warez
,
Hack
,
Joke program
,
Hacking
,
Cracker
,
Logic bomb
,
Blended threat
,
Demo
,
Time bomb
,
Example of a trojan horse
,
Crackers
,
Hacker
,
Honeypot
,
Feature
,
Patch
,
Root kit
,
Drive-by download
,
Zombie
,
Vaporware
,
White hat
,
Distributed denial-of-service attack
a new attack against a vulnerability never seen before
yesky.com
an exploit that takes advantage of a vulnerability on the same day that the vulnerability is announced
explabs.net
an exploit which has been released without the target software vendor being aware of the vulnerability being exploited
skiifwrald.com
a program the takes advantage of a flaw that hasn't yet been uncovered by developers, security professionals or others
news.com.com
The best time to use an exploit is within 24 hours of the vulnerability being announced, as many administrators won't have got around to applying the patch.
dnjonline.com
View 2 more results