vulnerability

(Image source: Apple)