This report provides a summary of critical severity vulnerabilities. The report has an executive summary chapter showing tables and trend graphs highlighting the status of critical severity vulnerabilities. The two following chapters provide the delta between critical severity vulnerabilities that are exploitable versus not exploitable.