If the attacker knows the operating system and web browser, then s/he can create an exploit for the victim.

Reply via email to