EXAMPLES: Exploitation: After the weapon is delivered to the target host, the malicious code of the attacker is triggered, either by exploiting an application or <operating system> vulnerability (such as a buffer overflow), by convincing users to click on an e-mail attachment or by leveraging operating system features that execute code automatically (e.g. 'autorun.inf' in Windows).