Vulnerabilities in John Reese software