An attacker could use the exploit to run any code they want...
An attacker could use the exploit to run any code they want to on a person's system. It could be they want to launch some really nasty code on a user's system.
Click Here or the flag on image above to change the background image