Authentication vulnerabilities