Also found in: Thesaurus, Legal, Encyclopedia, Wikipedia.


 (ĕk′sploit′, ĭk-sploit′)
1. An act or deed, especially a brilliant or heroic one. See Synonyms at feat1.
2. Computers A program or system designed to take advantage of a particular error or security vulnerability in computers or networks.
tr.v. (ĭk-sploit′, ĕk′sploit′) ex·ploit·ed, ex·ploit·ing, ex·ploits
1. To employ to the greatest possible advantage: exploit one's talents.
2. To make use of selfishly or unethically: a corporation that exploited peasant labor.

[Middle English, from Old French esploit, from Latin explicitum, neuter past participle of explicāre, to unfold; see explicate.]

ex·ploit′a·bil′i·ty n.
ex·ploit′a·ble adj.
ex·ploit′a·tive, ex·ploit′ive adj.
ex·ploit′a·tive·ly, ex·ploit′ive·ly adv.
ex·ploit′er n.
ThesaurusAntonymsRelated WordsSynonymsLegend:
Adj.1.exploited - developed or used to greatest advantage
unexploited, undeveloped - undeveloped or unused; "vast unexploited (or undeveloped) natural resources"; "taxes on undeveloped lots are low"
2.exploited - of personsexploited - of persons; taken advantage of; "after going out of his way to help his friend get the job he felt not appreciated but used"
misused - used incorrectly or carelessly or for an improper purpose; "misused words are often laughable but one weeps for misused talents"
References in classic literature ?
He sees precisely in this inequality a purpose to be served, a condition to be exploited.
To date, Mimecast has not seen ROPEMAKER exploited in the wild.
If exploited, the vulnerability allows attackers to upgrade any Windows user level account to an administrator account, giving them access to install malicious software, gain access to other machines, change user settings and an array of other potentially damaging acts.
Israeli security researchers at Northbit, a security firm, claim to have further exploited that hack and have devised a method to hack any unpatched Android device.
When a new vulnerability is exploited, not only can malware, known or unknown, be silently installed, criminals can manually take over the exploited computer thereby evading signatures and heuristics designed to detect malicious code.
The total area licensed for mining reached 52,000 square km," Shawli said, adding that the licensed companies have already exploited 300 million tons of raw minerals.
As Internet Explorer is the browser of choice for the majority of users, it's no surprise that this vulnerability was immediately heavily exploited by cybercriminals.
Alberta's Protection of Children Involved in Prostitution Act passed in 1999 will be amended to provide more support to children and youth who are sexually exploited through prostitution.
Quickly: Mazu Profiler alerted on Zotob's first infection point and tracked how the worm was propagating, noting the ports and protocols being exploited and listing all infected systems.
Since the beginning of history, children throughout the world have been exploited by adults.
And if this new fad should catch on as the main strategy for assisting historically exploited minorities, we can expect continued failure in solving the problem of racial inequality in American economic life.
Overall, 71% of attacks on these users exploited the CVE-2017-0199 vulnerability.