Uncovering Vulnerabilities Beyond Software Vulnerabilities