The term exploit describes a program, piece of code or even some data written by a hacker or malware writer that is designed to take advantage of a bug or vulnerability in an application or operating system.
Using the exploit, an attacker gains unauthorized access to, or use of, the application or operating system.
Exploits are often named after the vulnerability they use to penetrate systems:
a buffer overflow, for example.