Vulnerabilities a Penetration