Known Vulnerabilities in Advanced Security