security flaws (Page 31)