Vulnerabilities in Proofpoint software