Vulnerabilities in distributed computer systems