Known Vulnerabilities in ksh