Vulnerabilities in Security Network Protection