Zero-day vulnerability: Difference between revisions

From The Jolly Contrarian
Jump to navigation Jump to search
(Created page with "{{a|systems|}}{{d|{{PAGENAME}}|/ˈzɪərəʊ-deɪ ˌvʌlnərəˈbɪlɪti/|}} A vulnerability in code that hackers find before the software vendor has become aware of it. Becau...")
 
No edit summary
Line 1: Line 1:
{{a|systems|}}{{d|{{PAGENAME}}|/ˈzɪərəʊ-deɪ ˌvʌlnərəˈbɪlɪti/|}}
{{a|systems|}}{{d|{{PAGENAME}}|/ˈzɪərəʊ-deɪ ˌvʌlnərəˈbɪlɪti/|}}
A vulnerability in code that hackers find before the software vendor has become aware of it. Because the vendor are unaware, no patch exists for zero-day vulnerabilities, making attacks likely to succeed.
 
A vulnerability in code that hackers find before the software vendor does. Because the vendor is none-the-wiser, there is no patch for the bug, meaning until the vendor (a) twigs that there’s a problem, (b) works out how to fix it and (c) rolls the patch out to its customers, hackers who know about it can have a field-day.

Revision as of 17:23, 17 January 2023

The JC’s amateur guide to systems theory


Index: Click to expand:

Comments? Questions? Suggestions? Requests? Insults? We’d love to 📧 hear from you.
Sign up for our newsletter.

Zero-day vulnerability
/ˈzɪərəʊ-deɪ ˌvʌlnərəˈbɪlɪti/ ('.)

A vulnerability in code that hackers find before the software vendor does. Because the vendor is none-the-wiser, there is no patch for the bug, meaning until the vendor (a) twigs that there’s a problem, (b) works out how to fix it and (c) rolls the patch out to its customers, hackers who know about it can have a field-day.