Would not the machines rooted with these exploits be likely to be used to log into many mysql installs?
Would not the machines rooted with these exploits be likely to be used to log into many mysql installs?