Known Vulnerabilities in Secure Remote Access Base