security flaws (Page 21)