Porous Nodes: Specific Vulnerabilities