Exploring vulnerabilities