security flaws (Page 6)