security flaws (Page 20)