Known Vulnerabilities in Application Control