security flaws (Page 4)