security flaws (Page 40)