Detailed analysis of security vulnerabilities
Listening TCP ports are sequentially allocated, allowing spoofing attacks.