Vulnerabilities in Threat Discovery Appliance