Vulnerabilities in HarmisTechnology software