Software Vulnerabilities and Exploitation