Vulnerabilities in Amazon EC2