pdf complete%2C inc. Exploited Vulnerabilities