Exploiting Linux Vulnerabilities