Identifying and Mitigating Exploitation of the Multiple Vulnerabilities in Cisco PGW Softswitch