Vulnerabilities in Fedor Indutny software