Vulnerabilities in Naoki Ohashi software