blog vulnerabilities