Vulnerabilities in PTC software