intake Exploited Vulnerabilities