Vulnerabilities in Phoenix Technologies software