Vulnerabilities in Redash software