Known Vulnerabilities in IBM Match 360 page 2