Common Cyber Crime Vulnerabilities