Known vulnerabilities in office applications