general bytes Exploited Vulnerabilities