Types of vulnerabilities