security flaws (Page 42)