Vulnerabilities and exploits