What does an email exploit do?