Application‐Level Threats and Vulnerabilities