security flaws (Page 3)