Vulnerable software environment where an unauthorized user can utilize as starting point to alter or extract data