Known Vulnerabilities in Red Hat Storage Console