security flaws (Page 5)