Vulnerabilities of unsecured databases If you do not configure security, you must be aware of the following vulnerabilities.