acl Exploited Vulnerabilities