Vulnerabilities in b2evolution