Exploiting the vulnerability