Known Vulnerabilities in Real User Monitoring