Vulnerabilities in Trent Mick software