exploit the Vulnerability