Vulnerabilities in IBM Connections