Locating and verifying publicly available exploits