security flaws (Page 35)