Vulnerabilities in Joshua Gleitze software