axiomatic Exploited Vulnerabilities