Rational Requirements Composer Vulnerabilities