security flaws (Page 13)