A security analyst, Ann, is reviewing an IRC channel and notices that a malicious exploit has
been created for a frequently used application. She notifies the software vendor and asks
them for remediation steps, but is alarmed to find that no patches are available to mitigate
this vulnerability. Which of the following BEST describes this exploit?
A.
Malicious insider threat
B.
Zero-day
C.
Client-side attack
D.
Malicious add-on