EXPLOIT VULNERABILITIES