During the data lifecycle phase, three vulnerabilities are data breaches, malware attacks, and unauthorized access. These vulnerabilities risk exposing sensitive data, corrupting data integrity, and violating privacy. Mitigating methods like access controls, encryption, and monitoring should be implemented based on the classifications of data to address risks appropriately.