dbl technology (dbltek) Exploited Vulnerabilities