Which of the following BEST describes a security exploit for which a vendor patch is not readily available?