This is a dedicated watch page for a single video.
As a cybersecurity analyst, you discover a known vulnerability in a web application that could allow an attacker to execute arbitrary code on the server. What term is used to describe the act of taking advantage of this vulnerability?