Red Hat Trended Vulnerabilities