Known Vulnerabilities in Pipeline Utility Steps 2.13.2