Exploits by themselves aren't good or bad - their use for malicious purposes is.
See also: adversarial interoperability.
Exploits by themselves aren't good or bad - their use for malicious purposes is.
See also: adversarial interoperability.