5vtechnologies Exploited Vulnerabilities