Vulnerabilities in Mika Epstein software