Vulnerabilities in Black Box software