Through a successful format-string attack against a web application, an attacker is able to execute which of the following actions?
a) All the above options
b) Read and write to memory at will
c) Write only certain areas using tokens
d) Read certain memory areas using the %s token