SECURITY VULNERABILITIES