Known Vulnerabilities in Job Configuration History