Known Vulnerabilities in Connected Components Workbench