Vulnerabilities in steal 2.2.4