security flaws (Page 29)