. . "If there???s a vulnerability, it could be maliciously exploited, but most of these episodes are cases when a user logs into their system as normal and discovers they???re looking at someone else???s data." . .