Vulnerabilities in F-Secure software