Zed Attack Proxy Vulnerabilities