3.3.1.1. Identify and mitigate all vulnerabilities that were used