2. Vulnerability detection and mitigation for CVE-2021-34527 a. Explanation of the vulnerability and how it is exploited. b. Explanation and design of approach to detect exploitation of the vulnerability. c. Explanation and design of approach to mitigate exploitation of the vulnerability. Each part should explain all the technical details but without being excessively long. Limitations (if any should also be briefly discussed)..