crypto vulnerabilities