Vulnerabilities in CyberArk software