Known Vulnerabilities in Red Hat Single Sign-On page 5