Vulnerabilities in Compatibility Action Storage