Known Vulnerabilities in Storage Ceph page 2