Exploits are related to security vulnerabilities.
Exploiting these vulnerabilies involves detection of them and then using the correct method of penetration.
Some vulnerabilities are: