cryptographic vulnerabilities