Vulnerabilities in icegram software