Common C Vulnerabilities and Attacks