Common Vulnerabilities In Cyber Security