Which of the following are examples of vulnerabilities?