Exploiting Time-Sensitive Vulnerabilities