k7computing Exploited Vulnerabilities