such as the W-Item exploit