Known Vulnerabilities in shadow-utils