Some of these vulnerabilities look more like backdoors