explain exploit in cyber security - Search