Tag vulnerability exploitability