Security vulnerabilities

Summary