Known Vulnerabilities in Siveillance Identity 1.1