security flaws (Page 22)