Vulnerabilities in Rich Trott software