If an operating system allows sequential use of an object without refreshing it, what security issue can arise?