security flaws (Page 38)