Detecting Exploitable Vulnerabilities in Android Applications