security flaws (Page 12)