zhenshi Exploited Vulnerabilities