Vulnerabilities in CF Deployment