Known Vulnerabilities in Crowd Data Center page 2