Known Vulnerabilities in Total Security