CPU vulnerabilities