Vulnerabilities in ThroughTek software