applied informatics Exploited Vulnerabilities