One single vulnerability is all an attacker needs