Known Vulnerabilities in Event Streams page 4