Known Vulnerabilities in IBM Intelligent Operations Center 5.2.4 page 2