When a group discovers exploits they usually put out code to use it. How does one use this? EXplain the whole exploit thing please.

example:

www.sercuiteam.com/exploits/5NPOJ2A9PC.HTML


hjack