technical vulnerabilities