security flaws (Page 17)