Rooting vulnerabilities