simple e-document Exploited Vulnerabilities