Vulnerabilities in Adam Johnson software