Vulnerabilities in Warren Daloyan software