The following is information about SECURITY VULNERABILITIES