security flaws (Page 28)