Known Vulnerabilities in Post Duplicator 2.2