7.1.7 identify types of vulnerabilities - Search