Vulnerabilities in Red Hat Gluster Storage Web Administration