Known Vulnerabilities in Vision Acquisition Software