Logical vulnerabilities