Known Vulnerabilities in Endpoint Security