An attacker could use the exploit to run any code they want to on a person's system. It could be they want to launch some really nasty code on a user's system.  -   Thomas Kristensen     Quotes
An attacker could use the exploit to run any code they want to on a person's system. It could be they want to launch some really nasty code on a user's system. Thomas Kristensen