Vulnerabilities in Elide 4.5.4