Known Vulnerabilities in Business Process Monitor