Known Vulnerabilities in Red Hat Advanced Cluster Security for Kubernetes page 3