An exploit is a program or technique that takes advantage of a vulnerability in a web-browser, software application or operating system to remotely attack your computer. When surfing to a website with browser exploits, the may result in unwanted software (see also Trojan Horse) being downloaded to your computer. These type of threats invade a PC with the help of infected links, websites and email attachments among others.
What does a Exploit threat do?
Exploits force adware, phishing programs or any other type of fraudulent software into your device which may result in hackers gaining remote access to the infected computer allowing them to perform operations like modification of files, theft of personal information or installation of other malicious software.