Vulnerabilities in steal