Known Vulnerabilities in Red Hat Integration Camel-K