security flaws (Page 27)