Known Vulnerabilities in PI Data Archive