Vulnerabilities in axiomatic-systems software