Vulnerabilities In Network Security