Vulnerabilities in Red Hat Virtualization 8