Vulnerabilities in Haruki Konishi software