Vulnerabilities in Red Hat Single Sign-On