. . "information, and other vulnerabilities" . .