Vulnerabilities in YITH software