Known Vulnerabilities in IBM Elastic Storage System page 2