Vulnerabilities in IBM Security Verify Bridge