Vulnerabilities in Thomas Belser software