Vulnerabilities in Crucial US software