array networks Exploited Vulnerabilities