Known Vulnerabilities in Data Virtualization