Infographic: Five Vulnerabilities SVR is Exploiting Right Now and How to Stop Them