Exploited system vulnerabilities