Vulnerabilities in Callback Technologies software