security flaws (Page 39)