security flaws (Page 25)