Known Vulnerabilities in Pipeline Utility Steps