Known Vulnerabilities in Red Hat Virtualization 8