Vulnerabilities in Sajjad Hossain Sagor software