Known Vulnerabilities in Configuration as Code