Vulnerabilities in Pulse Secure software