Exercise 1Vulnerability analysis with RHACSrhacscvepwnkitopenshiftacscontainersIn this first exercise we'll analyze container images for vulnerabilities.