Red Hat Tower Vulnerabilities