protocol vulnerabilities