Vulnerabilities in IBM Process Mining