Article on the subject of "exploiting vulnerabilities"