vulnerability introduction