security flaws (Page 43)