security flaws (Page 18)