Vulnerabilities in Graylog software