Known Vulnerabilities in Threat Discovery Appliance