Vulnerabilities in HiOS