Vulnerabilities in Red Hat Software Collections