Vulnerabilities in database