Known Vulnerabilities in Data Transfer