Vulnerabilities in i2 Analyze