Known Vulnerabilities in Red Hat Satellite page 4