Vulnerabilities in Ghazale Shirazi software