Input method vulnerability