Vulnerabilities in Raj Kothari software