Security vulnerabilities