burk technology Exploited Vulnerabilities