actions Exploited Vulnerabilities