IBM Software Use Analysis Vulnerabilities