Carlos Alberto Lopez Perez <clopez@igalia.com> writes: > Attackers usually don't start trying to probe exploit after exploit. Of course they do. That is, *by far*, the most common attacker strategy on the Internet. Just look at the logs of any Internet-facing service. -- Russ Allbery (rra@debian.org) <http://www.eyrie.org/~eagle/>