Vulnerabilities in Dan Burkert software