5 cve vulnerabilities