Vulnerabilities in Thomas A. Hirsch software