Breakdown of vulnerable apps