It is an exploit if, had it been done against an M$ product or *nux, you'd be calling it an exploit.

It is a hack if, had it been done against a M$ product or *nux, it would be a hack.

It is a...