addressing-5-voip-vulnerabilities