Figure 14: Comparison of vulnerabilities.