Vulnerabilities in radykal software