Known Vulnerabilities in IBM Workload Automation