Unless you want to setup a honeypot and see the realtime feed of exploits, this is definitely a risky move!