Question: Provide a brief description of what you found for vulnerabilities; identify the severity of the vulnerability for each, and explain why you should be concerned about the critical and high severities. Identify which vulnerabilities should not pass through your computer.