align technology Exploited Vulnerabilities