microhard systems Exploited Vulnerabilities