If you’re logging into a website that allows your username and password to be transmitted unencrypted over the Internet—that’s a vulnerability. The exploit would be a software program that eavesdrops on Internet connections, records your username and password, and then uses it to access your account. If a piece of software enables you to see the private files of another user, that’s a vulnerability. The exploit would be the software program that allows me to see them. If a door lock can be opened without a key, that’s also a vulnerability. The exploit would be whatever physical shim or tool is
...more

