changing information technology Latest High & Critical Vulnerabilities