Vulnerabilities in IBM Content Collector for SAP Applications