They're able to then include these vulnerabilities in their own personal malicious exploit codes which can be utilised to contaminate Sites with malware spam. It depends upon who designed the virus. Most are made by criminals for money get. Ransomware or phishing attacks are generally of this type. Some are https://charliel369djm8.iamthewiki.com/user