Exploitation can result in hackers gaining access to full browsing histories and all of the user’s internet activities.
Source: Threadpost