softland Exploited Vulnerabilities