supply chain threat vector zero day application vulnerabilities web-based vulnerabilities cryptographic vulnerabilities virtualisation vulnerabilities operating system vulnerabilities hardware vulnerabilities misconfiguration vulnerabilities