Well, of course the payload can be anything you like - you could use it as a dropper for a variety of other exploits. However, the attack vector would still be through the client PC, and the server...
Search:Type: Posts; User: dynamoo; Keyword(s): Search: Search took 0.06 seconds.
Results 1 to 2 of 2
|
|