security flaws (Page 37)