Hi tanyoo10,

> (1) When a vulnerability is unknown, exploit-based might be a good
solution.

just in case you didn't realize...if you have the exploit to generate
the signature, you already know what the vulnerability is.

cheers,
  sergio


Reply via email to