Vulnerabilities in IRay Technology software