DETECTING VULNERABILITIES