Handling exploited weaknesses