Vulnerabilities in Inductive Automation software