1.2.7. Vulnerabilities