secure computing %5bobject Object%5d Vulnerabilities