Exploitation. As soon as a vulnerability is determined, the attacker crafts a payload to use the vulnerability and executes the payload code around the focus on program.This permits an attacker to form the commands executed to the vulnerable system or to execute arbitrary code on it.Viagra is not accredited to be used in Females and scientific tes