An attacker could use the exploit to run any code they want...
An attacker could use the exploit to run any code they want to on a person's system. It could be they want to launch some really nasty code on a user's system.
An attacker could use the exploit to run any code they want to on a person's system. It could be they want to launch some really nasty code on a user's system.