An exploit is a piece of software/code that takes advantage of a bug, glitch or vulnerability in the firmware to run a script or a program. Every known exploit of the psp is used to run homebrew applications (like eLoader or the 2.0 eboot loader).
A piece of code written to take advantage of an error in an application to cause it to behave in a way desired by the code writer The act of manipulating software and computers in ways their owners do not intend or expect. A hack
To exploit is to take advantage of a weakness; so in network security terms, an exploit is an attack designed to take advantage of a vulnerability in the system. Often, this vulnerability is a backdoor.
A way of breaking into a system. An exploit takes advantage of a weakness in a system in order to hack it. Exploits are the root of the hacker culture. Hackers gain fame by discovering an exploit. Others gain fame by writing scripts for it. Legions of script-kiddies apply the exploit to millions of systems, whether it makes sense or not. Since people make the same mistakes over-and-over, exploits for very different systems start to look very much like each other. Most exploits can be classified under major categories: buffer overflow, directory climbing, defaults, Denial of Service.
An Exploit is a file that will take advantage of design flaws (vulnerabilities) in software in order to hack a system. The exploit may be used to perform a number of different actions such as downloading worms and Trojans, accessing confidential data or crashing the software (Denial of Service) depending on the nature and severity of the vulnerability. The best way to protect against Exploits is to frequently run the Windows Update feature built into Microsoft Windows to download all of Microsoft's recent security updates.
In computer security, an exploit is a piece of software, a chunk of data, or sequence of commands that take advantage of a bug, glitch or vulnerability in order to get unintended or unanticipated behavior out of computer software, hardware, or something electronic (usually computerized). This frequently includes such things as gaining control of a computer system or allowing privilege escalation or a denial of service attack.
In the realm of online games, an exploit is usually a software bug, hack or bot that contributes to the user's prosperity in a manner not intended by the developers. In other words it is a form of cheating.