Vulnerabilities in Bluetooth