Explain About Boot Process Vulnerabilities