Vulnerabilities in Hit Reach software