Exploitation. As soon as a vulnerability is identified, the attacker crafts a payload to take advantage of the vulnerability and executes the payload code within the goal method.This allows an attacker to condition the commands executed about the susceptible procedure or to execute arbitrary code on it.It is possible to electronic mail the locatio