Is It common amongst hackers, in general, to read up on the CVE that gets used to exploit a machine? I find reading up on CVE (why there is a vulnerability) fascinating but I know that it is not necessary to do the exploit in most cases.
(I wish I could have made a poll for this)
I personally prefer to understand why is it exploitable in the first place and how does the exploit work.
Actually, I think understanding that stuff is what distinguishes script kiddies and real “hackers”.