security flaws (Page 30)