vulnerable algorithms