Vulnerabilities in BENTLEY SYSTEMS software