Take a look at the top vulnerabilities of 2014, risks posed by them, their impact on internet and the ease of exploiting and fixing them.