Known Vulnerabilities Are A Cyber Criminal's Best Friend