exploit 音標拼音: ['ɛkspl
, ɔɪt] [
, ɛkspl'ɔɪt]
vt . 剝削,開發,利用
n . 功勞,功績,功勛
剝削,開發,利用功勞,功績,功勛
exploit 開拓
exploit n 1 :
a notable achievement ; "
he performed a great feat "; "
the book was her finest effort " [
synonym : {
feat }, {
effort },
{
exploit }]
v 1 :
use or manipulate to one '
s advantage ; "
He exploit the new taxation system "; "
She knows how to work the system "; "
he works his parents for sympathy " [
synonym : {
exploit }, {
work }]
2 :
draw from ;
make good use of ; "
we must exploit the resources we are given wisely " [
synonym : {
exploit }, {
tap }]
3 :
work excessively hard ; "
he is exploiting the students " [
synonym :
{
overwork }, {
exploit }]
Exploit \
Ex *
ploit "\,
n . [
OE .
esploit success ,
OF .
esploit ,
espleit ,
revenue ,
product ,
vigor ,
force ,
exploit ,
F .
exploit exploit ,
fr .
L .
explicitum ,
prop .
p .
p .
neut .
of explicare to unfold ,
display ,
exhibit ;
ex plicare to fold .
See {
Ply },
and cf . {
Explicit }, {
Explicate }.]
1 .
A deed or act ;
especially ,
a heroic act ;
a deed of renown ;
an adventurous or noble achievement ;
as ,
the exploits of Alexander the Great .
[
1913 Webster ]
Ripe for exploits and mighty enterprises . --
Shak .
[
1913 Webster ]
2 .
Combat ;
war . [
Obs .]
[
1913 Webster ]
He made haste to exploit some warlike service .
--
Holland .
[
1913 Webster ]
2 . [
F .
exploiter .]
To utilize ;
to make available ;
to get the value or usefulness out of ;
as ,
to exploit a mine or agricultural lands ;
to exploit public opinion . [
Recent ]
[
1913 Webster ]
3 .
Hence :
To draw an illegitimate profit from ;
to speculate on ;
to put upon . [
Recent ]
[
1913 Webster ]
In no sense whatever does a man who accumulates a fortune by legitimate industry exploit his employ ['
e ]
s or make his capital "
out of "
anybody else . --
W .
G .
Sumner .
[
1913 Webster ]
111 Moby Thesaurus words for "
exploit ":
abuse ,
accomplished fact ,
accomplishment ,
achievement ,
act ,
acta ,
action ,
adventure ,
apply ,
aristeia ,
attainment ,
beguile ,
benefit from ,
bestow ,
bleed ,
bleed white ,
blow ,
bold stroke ,
capitalize on ,
cash in on ,
clip ,
coup ,
cultivate ,
dealings ,
deed ,
do ,
doing ,
doings ,
drain ,
effort ,
employ ,
emprise ,
endeavor ,
enterprise ,
exercise ,
fait accompli ,
feat ,
finesse ,
fleece ,
gest ,
go ,
gouge ,
hand ,
handiwork ,
handle ,
heroic act ,
hold up ,
ill -
use ,
impose ,
impose upon ,
improve ,
improve the occasion ,
job ,
jockey ,
make capital of ,
make hay ,
make use of ,
maneuver ,
manipulate ,
measure ,
milk ,
misuse ,
move ,
operation ,
overcharge ,
overprice ,
overt act ,
overtax ,
passage ,
performance ,
play ,
play on ,
presume upon ,
proceeding ,
production ,
profit by ,
profiteer ,
put to advantage ,
res gestae ,
screw ,
skin ,
soak ,
step ,
stick ,
sting ,
stroke ,
stunt ,
suck dry ,
surcharge ,
swindle ,
take advantage of ,
thing ,
thing done ,
tour de force ,
trade on ,
transaction ,
turn ,
turn to account ,
turn to profit ,
turn to use ,
undertaking ,
use ,
use ill ,
use to advantage ,
utilize ,
venture ,
victimize ,
work ,
work on ,
work upon ,
works
安裝中文字典英文字典查詢工具!
中文字典英文字典工具:
複製到剪貼板
英文字典中文字典相關資料:
Exploit Database - Exploits for Penetration Testers, Researchers, and . . . The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more
About the Exploit Database The Exploit Database is a CVE compliant archive of public exploits and corresponding vulnerable software, developed for use by penetration testers and vulnerability researchers
Exploit Database Papers Archived security papers and articles in various languages
Linux Kernel 5. 8 lt; 5. 16. 11 - Local Privilege Escalation (DirtyPipe) * * There are two major limitations of this exploit: the offset cannot * be on a page boundary (it needs to write one byte before the offset * to add a reference to this page to the pipe), and the write cannot * cross a page boundary
Exploit Database Statistics The following graphs and statistics provide you with a glimpse of the entries that have been added to the Exploit Database over the years They will be re-generated, at minimum, on a monthly basis and will help you visualize how the exploit landscape is changing over time
SOPlanning 1. 52. 01 (Simple Online Planning Tool) - Exploit Database # Exploit Title: SOPlanning 1 52 01 (Simple Online Planning Tool) - Remote Code Execution (RCE) (Authenticated) # Date: 6th October, 2024 # Exploit Author: Ardayfio Samuel Nii Aryee # Version: 1 52 01 # Tested on: Ubuntu import argparse
Rejetto HTTP File Server (HFS) 2. 3. x - Exploit Database Rejetto HTTP File Server (HFS) 2 3 x - Remote Command Execution (2) CVE-2014-6287CVE-111386 remote exploit for Windows platform
Linux Kernel 3. 13. 0 lt; 3. 19 (Ubuntu 12. 04 14. 04 14. 10 15. 04 . . . Linux Kernel 3 13 0 < 3 19 (Ubuntu 12 04 14 04 14 10 15 04) - 'overlayfs' Local Privilege Escalation CVE-2015-1328 local exploit for Linux platform
Exploit Database SearchSploit Manual The Exploit Database repository is the main core of Exploit-DB, making SearchSploit efficient and easy to use However, some of the exploit metadata (such as screenshots, setup files, tags, and vulnerability mappings) are not included
Apache 2. 4. x - Buffer Overflow - Multiple webapps Exploit Apache 2 4 x - Buffer Overflow CVE-2021-44790 webapps exploit for Multiple platform