Vulnerabilities in Data Transfer 3.40S