Specific Vulnerabilities These documents provide outlines of how the vulnerablities exist and how they can be exploited.