security flaws (Page 36)