Known Vulnerabilities in Event Streams page 3