a Security Exploit


Another term for security vulnerability, a security exploit is an unintended and unpatched flaw in software code that exposes it to potential exploitation by hackers or malicious software code such as viruses, worms, Trojan horses and other forms of malware.

Security exploits may result from a combination of software bugs, weak passwords or software already infected by a computer virus or worm, and these security exploits require patches, or software fixes, in order to prevent the potential for unauthorized access or compromised integrity.

Read Also:

  • Enlightenment

    Enlightenment is a window manager and desktop environment for Linux and UNIX-based operating systems. It is also a suite of libraries known as EFL (the Enlightenment Foundation Libraries) to create user interfaces with much less work than using traditional toolkits. Enlightenment libraries power millions of systems, from mobile phones to set top boxes, desktops, laptops, […]

  • a Java Security Exploit

    A term that refers to any number of security exploits in Oracle’s Java software, which has a long history of being vulnerable to security flaws. The most recent Java Security Exploit appeared in early 2013, and affected all versions of Java up to Java 7 Update 10. This zero-day security vulnerability, referenced as CVE-2013-0422 by […]

  • a Security Vulnerabity

    An unintended flaw in software code or a system that leaves it open to the potential for exploitation in the form of unauthorized access or malicious behavior such as viruses, worms, Trojan horses and other forms of malware. Also referred to as security exploits, security vulnerabilities can result from software bugs, weak passwords or software […]

  • Google Nexus

    A line of smartphones and tablet devices developed by Google and various hardware partners. The Google Nexus first debuted in early 2010 as the Nexus One, and today the line consists of the Google Nexus 4, Nexus 7 and Nexus 10 devices. Google Nexus devices are powered by Google’s Android open source mobile operating system. […]

  • 802.11ad

    A wireless LAN (WLAN) specification under development by the IEEE (Institute of Electrical and Electronics Engineers) that will serve as the successor to the 802.11ac specification, which is also currently under development. The 802.11ad standard is expected to be approved by the IEEE in 2014. The 802.11ad specification operates in the 60GHz frequency band, as […]


Disclaimer: a Security Exploit definition / meaning should not be considered complete, up to date, and is not intended to be used in place of a visit, consultation, or advice of a legal, medical, or any other professional. All content on this website is for informational purposes only.