Known Vulnerabilities in Database