Vulnerabilities in IBM Intelligent Operations Center 5.2