exploited vulnerabilities