The packet should be filtered, so only the packets which are included exploit remain.
The packet should be filtered, so only the packets which are included exploit remain.