amac Exploited Vulnerabilities