Creating a vulnerable application