Known Vulnerabilities in IBM Transformation Extender Advanced -