applied informatics Poco Vulnerabilities