Am I Exploitable: validating if your system is exploitable to specific vulnerabilities

Am I Exploitable