yida Exploited Vulnerabilities