Active exploitation security flaws