2.1.2.7. Vulnerabilities