critical vulnerabilities