Vulnerability In Cyber Security