Vulnerabilities in Beckhoff software