Checkpoint Exploited Vulnerabilities