security flaws (Page 26)