Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. | Installation of these exploits requires a previously exploited system to install. After installation, they can be used on their own. |