intruder vulnerability