Difference between revisions of "Exploit"
From MgmtWiki
(→Full Title) |
(→Context) |
||
Line 5: | Line 5: | ||
# Exploits are, as a rule, reported to the CVE | # Exploits are, as a rule, reported to the CVE | ||
# As a general rule [[Attacks]] are directed at known exploits, but can include simple exploration of the [[Ecosystem]] looking for an unknown [[Vulnerability]]. | # As a general rule [[Attacks]] are directed at known exploits, but can include simple exploration of the [[Ecosystem]] looking for an unknown [[Vulnerability]]. | ||
+ | |||
+ | ==Solutions== | ||
+ | * [[Indicators of Compromise]] for definitions of discovery when an [[Exploit]] has succeeded against a target. | ||
==References== | ==References== | ||
[[Category: Glossary]] | [[Category: Glossary]] |
Revision as of 12:39, 6 September 2022
Contents
Full Title
An Exploit is a malicious implementation of code that takes advantage of a Vulnerability in the design or implementation of a solution.
Context
- Exploits are part of the standard Threat Model
- Exploits are, as a rule, reported to the CVE
- As a general rule Attacks are directed at known exploits, but can include simple exploration of the Ecosystem looking for an unknown Vulnerability.
Solutions
- Indicators of Compromise for definitions of discovery when an Exploit has succeeded against a target.