Vulnerabilities in Red Hat Inc. software