Exploitation Of Vulnerabilities Research Articles