A vulnerability has been found or a vulnerability has been exploited.
The exploitation of vulnerabilities is one of the most frequently used cyberattack methods. They can concern software vulnerabilities, design vulnerabilities or poorly configured protection (default passwords).