from Wiktionary, Creative Commons Attribution/Share-Alike License.
adjective Able to be exploited, especially commercially
adjective Easily fooled; credulous
Etymologies
Sorry, no etymologies found.
Support
Help support Wordnik (and make this page ad-free) by adopting the word exploitable.
Examples
While on the one hand, it's hard to fault the guy for making decisions that will make him, and his shareholders rich, by cranking out "exploitable" games, the fact is that of all the publishers out there, Activision is more than capable of weathering the inherent risks of making new and different games.
Where do people get the idea that smart students are supposed to be some kind of exploitable resource whose primary role is to help the rest of the school?
The redacted version of "Saddam and Terrorism" is the most definitive public assessment to date from the Harmony program, the trove of "exploitable" documents, audio and video records, and computer files captured in Iraq.
"These movies couldn't get big stars, so they had to have what they called 'exploitable' elements, lurid material that Hollywood movies couldn't or wouldn't do," Rodriguez says.
Adobe didn't provide many details on the vulnerability but wrote that it is remotely exploitable, meaning a hacker could use it to infect a computer with malicious software over the Internet.
Adobe didn't provide many details on the vulnerability but wrote that it is remotely exploitable, meaning a hacker could use it to infect a computer with malicious software over the Internet.
Adobe didn't provide many details on the vulnerability but wrote that it is remotely exploitable, meaning a hacker could use it to infect a computer with malicious software over the Internet.
Adobe didn't provide many details on the vulnerability but wrote that it is remotely exploitable, meaning a hacker could use it to infect a computer with malicious software over the Internet.
Adobe didn't provide many details on the vulnerability but wrote that it is remotely exploitable, meaning a hacker could use it to infect a computer with malicious software over the Internet.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.