Vulnerabilities in James Heinrich software