Vulnerabilities in Karol Wrótniak software