encryption software vulnerabilities