security flaws (Page 24)