A piece of software, a chunk of data, or a sequence of commands that take advantage of a bug, a glitch, or a vulnerability in software in order to penetrate a user’s system with malicious intentions. These malicious intentions may include gaining control of a computer system, allowing privilege escalation, or launching a denial-of-service attack.