Known Vulnerabilities in IBM Sterling Transformation Extender