security flaws (Page 2)