exploit vulnerabilities