sfturing Exploited Vulnerabilities