APPLICATION VULNERABILITIES