vulnerabilities in network security