Known Vulnerabilities in Red Hat Software Collections