Security vulnerabilities in Shield Security (3)