Vulnerabilities in Tortoise software