security flaws (Page 33)