Critical vulnerabilities