security flaws (Page 8)