Vulnerabilities in Tenable Network Security software