Known Vulnerabilities in Processor Identification Utility-Legacy