Software Vulnerabilities

A vulnerability is a weakness in design, implementation, operation, or internal control. Most of the vulnerabilities that have been discovered are documented in the Common Vulnerabilities and Exposures (CVE) database. An exploitable vulnerability is one for which at least one working attack or exploit exists. Vulnerabilities can be researched, reverse-engineered, hunted, or exploited using automated tools or customized scripts.[16][17] To secure a computer system, it is important to understand the attacks that can be made against it.[1]

Software vulnerability examples

0-Days

The term "zero-day" originally referred to the number of days since a new piece of software was released to the public, so "zero-day software" was obtained by hacking into a developer's computer before release.[2]

See also: Hacking


  1. "Computer security", Wikipedia, https://en.wikipedia.org/wiki/Computer_security#Vulnerabilities_and_attacks ↩︎

  2. "Zero-day (computing)", Wikipedia. ↩︎