Vulnerabilities In Computer Security