device vulnerabilities