Vulnerabilities in Horner Automation software