Vulnerabilities in Advanced Security