Known Vulnerabilities in Deep Security