![](https://media.kasperskydaily.com/wp-content/uploads/sites/92/2015/12/06020424/wide-697x465.png)
Pikes in the lake: new bugs to keep us awake
Vulnerabilities vary. Some are considered critical, some – less problematic; their severity is determined by a few well-known factors such as ease of exploitability and popularity of software. But, no matter their differences they all require serious attention at a constant level, so that when the next Shellshock-like incident occurs, it won’t take cybersecurity world by surprise.