Many things.
It can delete or damage files, and in so doing, destroy your personal files or your operating system. It can also overclock you processor to the point of failure or destroy it in other ways. It can also wear out Flash Memory or even RAM by sending excessive read/write commands for long periods of time, but this in not a common attack.
The most common in what I first mentioned: File manipulation. This is usually done to destroy your operating system.
Chat with our AI personalities
It is possible for a hacker to maliciously inject code into another user's computer by inserting the code into a jpeg image, a pdf document or a macro, or inserting malicious script in a guest book entry. The code, usually written in php, contains commands that will alter the behaviour of the computer.