Vulnerabilities in Joost de Valk software