Guess the Exploit: Famous Hacks and Their Vulnerabilities