Vulnerabilities in Red Hat Ceph Storage 4.0