security flaws (Page 34)