Known Vulnerabilities in Proofpoint Enterprise Protection