tripath project Exploited Vulnerabilities