binary-husky Exploited Vulnerabilities