Known Vulnerabilities in Leyka 2.3.6.1