An attack on a computer system, particularly if it takes advantage of an existing vulnerability in the operating system, applications, plug-ins or software.
Software like operating systems, browsers, text and spreadsheet editors have vulnerabilities. Some of these vulnerabilities can be exploited, which will result in code execution, where the executed code is controlled by an attacker or ethical hacker. This executed code can result in further code execution, e.g. downloading and starting malware.