exploit 音标拼音: ['ɛkspl
, ɔɪt] [
, ɛkspl'ɔɪt]
vt . 剥削,开发,利用
n . 功劳,功绩,功勋
剥削,开发,利用功劳,功绩,功勋
exploit 开拓
exploit n 1 :
a notable achievement ; "
he performed a great feat "; "
the book was her finest effort " [
synonym : {
feat }, {
effort },
{
exploit }]
v 1 :
use or manipulate to one '
s advantage ; "
He exploit the new taxation system "; "
She knows how to work the system "; "
he works his parents for sympathy " [
synonym : {
exploit }, {
work }]
2 :
draw from ;
make good use of ; "
we must exploit the resources we are given wisely " [
synonym : {
exploit }, {
tap }]
3 :
work excessively hard ; "
he is exploiting the students " [
synonym :
{
overwork }, {
exploit }]
Exploit \
Ex *
ploit "\,
n . [
OE .
esploit success ,
OF .
esploit ,
espleit ,
revenue ,
product ,
vigor ,
force ,
exploit ,
F .
exploit exploit ,
fr .
L .
explicitum ,
prop .
p .
p .
neut .
of explicare to unfold ,
display ,
exhibit ;
ex plicare to fold .
See {
Ply },
and cf . {
Explicit }, {
Explicate }.]
1 .
A deed or act ;
especially ,
a heroic act ;
a deed of renown ;
an adventurous or noble achievement ;
as ,
the exploits of Alexander the Great .
[
1913 Webster ]
Ripe for exploits and mighty enterprises . --
Shak .
[
1913 Webster ]
2 .
Combat ;
war . [
Obs .]
[
1913 Webster ]
He made haste to exploit some warlike service .
--
Holland .
[
1913 Webster ]
2 . [
F .
exploiter .]
To utilize ;
to make available ;
to get the value or usefulness out of ;
as ,
to exploit a mine or agricultural lands ;
to exploit public opinion . [
Recent ]
[
1913 Webster ]
3 .
Hence :
To draw an illegitimate profit from ;
to speculate on ;
to put upon . [
Recent ]
[
1913 Webster ]
In no sense whatever does a man who accumulates a fortune by legitimate industry exploit his employ ['
e ]
s or make his capital "
out of "
anybody else . --
W .
G .
Sumner .
[
1913 Webster ]
111 Moby Thesaurus words for "
exploit ":
abuse ,
accomplished fact ,
accomplishment ,
achievement ,
act ,
acta ,
action ,
adventure ,
apply ,
aristeia ,
attainment ,
beguile ,
benefit from ,
bestow ,
bleed ,
bleed white ,
blow ,
bold stroke ,
capitalize on ,
cash in on ,
clip ,
coup ,
cultivate ,
dealings ,
deed ,
do ,
doing ,
doings ,
drain ,
effort ,
employ ,
emprise ,
endeavor ,
enterprise ,
exercise ,
fait accompli ,
feat ,
finesse ,
fleece ,
gest ,
go ,
gouge ,
hand ,
handiwork ,
handle ,
heroic act ,
hold up ,
ill -
use ,
impose ,
impose upon ,
improve ,
improve the occasion ,
job ,
jockey ,
make capital of ,
make hay ,
make use of ,
maneuver ,
manipulate ,
measure ,
milk ,
misuse ,
move ,
operation ,
overcharge ,
overprice ,
overt act ,
overtax ,
passage ,
performance ,
play ,
play on ,
presume upon ,
proceeding ,
production ,
profit by ,
profiteer ,
put to advantage ,
res gestae ,
screw ,
skin ,
soak ,
step ,
stick ,
sting ,
stroke ,
stunt ,
suck dry ,
surcharge ,
swindle ,
take advantage of ,
thing ,
thing done ,
tour de force ,
trade on ,
transaction ,
turn ,
turn to account ,
turn to profit ,
turn to use ,
undertaking ,
use ,
use ill ,
use to advantage ,
utilize ,
venture ,
victimize ,
work ,
work on ,
work upon ,
works
安装中文字典英文字典查询工具!
中文字典英文字典工具:
复制到剪贴板
英文字典中文字典相关资料:
Exploit Database - Exploits for Penetration Testers, Researchers, and . . . The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more
About the Exploit Database About Exploit Database The Exploit Database is maintained by OffSec, an information security training company that provides various Information Security Certifications as well as high end penetration testing services The Exploit Database is a non-profit project that is provided as a public service by OffSec The Exploit Database is a CVE compliant archive of public exploits and corresponding
Exploit Database Statistics Exploit Database Statistics The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years They will be re-generated, at minimum, on a monthly basis and will help you visualize how the exploit landscape is changing over time
Unauthenticated Remote Code Execution (RCE) - Exploit Database Wing FTP Server 7 4 3 - Unauthenticated Remote Code Execution (RCE) CVE-2025-47812 remote exploit for Multiple platform
OpenSSH server (sshd) 9. 8p1 - Race Condition - Linux remote Exploit OpenSSH server (sshd) 9 8p1 - Race Condition CVE-2024-6387 remote exploit for Linux platform
Exploit Database Papers Archived security papers and articles in various languages
Linux PAM Environment - Variable Injection Local . . . - Exploit Database Linux PAM Environment - Variable Injection Local Privilege Escalation CVE-2025-6018 local exploit for Linux platform
motionEye 0. 43. 1b4 - RCE - Multiple webapps Exploit motionEye 0 43 1b4 - RCE CVE-2025-60787 webapps exploit for Multiple platform
WordPress Core 6. 2 - Directory Traversal - PHP webapps Exploit WordPress Core 6 2 - Directory Traversal CVE-2023-2745 webapps exploit for PHP platform
Apache 2. 4. x - Buffer Overflow - Multiple webapps Exploit Apache 2 4 x - Buffer Overflow CVE-2021-44790 webapps exploit for Multiple platform