ECCouncil 312-85 Practice Test 2

Question 1 / 10
In which of the following attacks does the attacker exploit vulnerabilities in a computer application before the software developer can release a patch for them?