A small piece of code (like a "shell") used to prove that the attacker gained control. Why It’s "Interesting"
Detailed instructions on how the researcher discovered the "hole."
Files from exploit databases are designed to be "weaponized" code. Even running them in a "test" environment can lead to system instability.