An attack on a computer system, particularly if it takes advantage of an existing vulnerability in the operating system, applications, plug-ins or software.