vulnerability checks