Known Vulnerabilities in Nearby device scanning