k7computing Endpoint Vulnerabilities