Attackers have frameworks and vulnerability exploit packages that automate discovery, exploit selection, and exploit deployment. Successful exploitation is just a matter of selecting a well-worn ...