Vulnerabilities in Deep Security