jizhi Exploited Vulnerabilities