They are certainly related in terms of the vulnerability that they exploit and the way they exploit them.