security flaws (Page 32)