Exploitation. As soon as a vulnerability is recognized, the attacker crafts a payload to use the vulnerability and executes the payload code to the target process.This permits an attacker to condition the commands executed about the susceptible system or to execute arbitrary code on it.This will include things like generating backdoors, putting in