Vulnerabilities in Crowd 2.1.1