Example vulnerability descriptions