Researchers compile list of vulnerabilities abused by ransom