{"componentChunkName":"component---src-templates-dictionary-term-tsx","path":"/dictionary/exploit","result":{"data":{"contentfulDictionaryTerm":{"title":"Exploit","slug":"exploit","descriptionMeta":{"childMarkdownRemark":{"rawMarkdownBody":"What is an exploit and why is it important to patch your software? Learn about zero-day exploits and how they can put your company's security at risk."}},"body":{"body":"# Exploit\nThis is when a vulnerability is used to access or infect a computer. Zero-day exploits are those that are used before a software vendor is made aware of the vulnerability. When the vulnerability is identified, software vendors release a patch to fix the vulnerability, which renders the exploit useless. This is why it is important to install software updates recommended by your operating system and programs that you use.","childMarkdownRemark":{"htmlAst":{"type":"root","children":[{"type":"element","tagName":"h1","properties":{"id":"exploit","style":"position:relative;"},"children":[{"type":"text","value":"Exploit"},{"type":"element","tagName":"a","properties":{"href":"#exploit","ariaLabel":"exploit permalink","className":["anchor","after"]},"children":[{"type":"element","tagName":"svg","properties":{"ariaHidden":"true","focusable":"false","height":"16","version":"1.1","viewBox":"0 0 16 16","width":"16"},"children":[{"type":"element","tagName":"path","properties":{"fillRule":"evenodd","d":"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z"},"children":[]}]}]}]},{"type":"text","value":"\n"},{"type":"element","tagName":"p","properties":{},"children":[{"type":"text","value":"This is when a vulnerability is used to access or infect a computer. Zero-day exploits are those that are used before a software vendor is made aware of the vulnerability. When the vulnerability is identified, software vendors release a patch to fix the vulnerability, which renders the exploit useless. This is why it is important to install software updates recommended by your operating system and programs that you use."}]}],"data":{"quirksMode":false}}}}}},"pageContext":{"title":"Exploit","slug":"exploit","keepLearning":[{"title":"Extension","slug":"extension"},{"title":"FTP (File Transfer Protocol)","slug":"ftp-file-transfer-protocol"},{"title":"Fingerprint","slug":"fingerprint"}],"breadcrumb":{"location":"/dictionary/exploit","crumbs":[{"pathname":"/","crumbLabel":"Homepage"},{"pathname":"/dictionary","crumbLabel":"dictionary"},{"pathname":"/dictionary/exploit","crumbLabel":"exploit"}]}}},"staticQueryHashes":["1614255152"]}