Vulnerabilities in Red Hat Ceph Storage