cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-13484,https://securityvulnerability.io/vulnerability/CVE-2024-13484,ArgoCD Vulnerability Allows Creation of Rogue Monitoring Rules,"A flaw exists in ArgoCD where the openshift.io/cluster-monitoring label is automatically applied to all namespaces deploying an ArgoCD Custom Resource (CR) instance. This labeling enables potential malicious creation of a rogue PrometheusRule, which is then propagated across the entire cluster. Such an oversight could severely impact the integrity of the platform's monitoring stack, creating vulnerabilities in the overall security posture.",Red Hat,Red Hat Openshift Gitops,8.2,HIGH,0.0004299999854993075,false,,false,false,false,,false,false,false,,2025-01-28T17:54:28.701Z,0 CVE-2022-4975,https://securityvulnerability.io/vulnerability/CVE-2022-4975,Cross-Site Scripting Flaw in Red Hat Advanced Cluster Security Portal,"An XSS vulnerability exists in the Red Hat Advanced Cluster Security portal. When rendering the table view, the portal populates a DOM table element with unsanitized data using innerHTML. This flaw can potentially allow attackers with some control over the rendered data to inject malicious scripts, leading to unauthorized access and data manipulation.",Red Hat,Red Hat Advanced Cluster Security 3,8.9,HIGH,0.0005000000237487257,false,,false,false,false,,false,false,false,,2025-01-27T13:47:55.595Z,0 CVE-2025-0650,https://securityvulnerability.io/vulnerability/CVE-2025-0650,Access Control Flaw in Open Virtual Network by Red Hat,"A flaw exists in the Open Virtual Network (OVN) where specially crafted UDP packets can bypass egress access control lists (ACLs). This vulnerability is present when a logical switch with DNS records configured and associated egress ACLs is utilized. Attackers could potentially exploit this flaw to gain unauthorized access to virtual machines and containers, leading to security breaches in OVN networks.",Red Hat,"Fast Datapath For Rhel 8,Fast Datapath For Rhel 9,Red Hat Openshift Container Platform 4",8.1,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-23T16:34:31.390Z,0 CVE-2024-11218,https://securityvulnerability.io/vulnerability/CVE-2024-11218,Container Breakout Vulnerability in Podman and Buildah,"A vulnerability exists in Podman and Buildah that allows for a container breakout, particularly when using the '--jobs=2' option during the build process of a malicious Containerfile. This vulnerability exploits a race condition that may lead to the exposure of files and directories on the host system. Though using SELinux can provide some degree of mitigation, it does not completely prevent the enumeration of sensitive host file systems, posing a risk for affected users.",Red Hat,"Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 8,Red Hat Openshift Container Platform 4",8.6,HIGH,0.00044999999227002263,false,,false,false,false,,false,false,false,,2025-01-22T04:55:30.649Z,359 CVE-2024-12084,https://securityvulnerability.io/vulnerability/CVE-2024-12084,Heap-based Buffer Overflow Vulnerability in Rsync Daemon by Red Hat,"A heap-based buffer overflow vulnerability has been identified in the rsync daemon, attributable to improper management of attacker-controlled checksum lengths (s2length). This weakness arises when the maximum digest length exceeds the designated fixed length of 16 bytes, allowing an attacker to exploit the flaw and write outside the allocated memory in the sum2 buffer. Such exploitation could potentially compromise system integrity and lead to unauthorized access or data manipulation.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",9.8,CRITICAL,0.0006300000241026282,false,,true,false,true,2025-01-15T17:00:18.000Z,false,true,true,2025-01-23T10:52:02.325Z,2025-01-15T14:16:35.363Z,6131 CVE-2024-12085,https://securityvulnerability.io/vulnerability/CVE-2024-12085,Rsync Daemon Memory Leak Vulnerability in Red Hat Products,"A vulnerability exists in the rsync daemon which can be exploited during the comparison of file checksums. An attacker can manipulate the checksum length, leading to potential leaks of one byte of uninitialized stack data at a time. This weakness could allow unauthorized access to sensitive information in memory, posing a security risk to affected systems.",Red Hat,"Red Hat Enterprise Linux 6 Extended Lifecycle Support - Extension,Red Hat Enterprise Linux 7 Extended Lifecycle Support,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 9.4 Extended Update Support,Logging Subsystem For Red Hat Openshift,Red Hat Openshift Container Platform 4",7.5,HIGH,0.0004600000102072954,false,,false,false,false,,false,false,false,,2025-01-14T18:15:00.000Z,242 CVE-2025-0306,https://securityvulnerability.io/vulnerability/CVE-2025-0306,Ruby Interpreter Vulnerability Affecting Messaging Security,"A vulnerability exists within the Ruby interpreter that is susceptible to the Marvin Attack. This weakness enables attackers to decrypt previously secured messages and fabricate signatures. By exchanging an extensive number of messages with the affected Ruby service, an attacker can compromise the integrity and confidentiality of the communication, posing significant risks to sensitive data.",Red Hat,"Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Storage 3",7.4,HIGH,0.000910000002477318,false,,false,false,false,,false,false,false,,2025-01-09T04:05:42.194Z,0 CVE-2024-45497,https://securityvulnerability.io/vulnerability/CVE-2024-45497,OpenShift Build Process Vulnerability Affecting Red Hat Products,"A significant vulnerability exists in the OpenShift build process, where the docker-build container is improperly configured with a hostPath volume mount that links the node's /var/lib/kubelet/config.json file to the build pod. This critical file contains sensitive credentials essential for accessing private repositories. The flawed configuration permits unprivileged write access, allowing attackers to overwrite this file. As a result, by modifying the config.json file, an attacker can cause a denial of service, disrupting the ability of the node to pull new container images. Additionally, this vulnerability poses significant risks by potentially allowing unauthorized access to sensitive credentials, which could lead to further compromises within the system.",Red Hat,"Red Hat Fuse 7,Red Hat Openshift Container Platform 4",7.6,HIGH,0.0004400000034365803,false,,false,false,false,,false,false,false,,2024-12-31T02:19:22.553Z,0 CVE-2024-12582,https://securityvulnerability.io/vulnerability/CVE-2024-12582,Vulnerability in Skupper Console Exposes Sensitive Data and Impacts Resource Availability,"A significant flaw exists in the Skupper Console, which serves as a read-only interface presenting network traffic details and metrics for applications configured in hybrid multi-cloud environments. The vulnerability arises when the default authentication mechanism is employed, resulting in the generation of a random password for the 'admin' user. This password is stored in plaintext within a Kubernetes secret or a Podman volume, leaving it susceptible to interception. An attacker exploiting this method can read any user-readable file within the container's filesystem, directly jeopardizing data confidentiality. Furthermore, by manipulating Skupper’s behavior, an attacker can prompt the system to read excessively large files into memory, potentially leading to a denial-of-service condition due to resource exhaustion.",Red Hat,Red Hat Service Interconnect 1,7.1,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-12-24T03:31:24.896Z,0 CVE-2024-25131,https://securityvulnerability.io/vulnerability/CVE-2024-25131,Privilege Escalation Vulnerability in OpenShift Dedicated by Red Hat,"A vulnerability exists in the MustGather.managed.openshift.io Custom Defined Resource (CRD) within OpenShift Dedicated. This flaw allows non-privileged users to create a MustGather object containing a specially crafted file. By doing so, these users can configure the most privileged service account to execute the job. This misconfiguration can lead to an escalation of privileges, effectively granting standard developer users the ability to act as cluster administrators and potentially pivot to the underlying AWS environment. Organizations utilizing OpenShift Dedicated must address this vulnerability to safeguard against unauthorized access and maintain a secure cloud infrastructure.",Red Hat,,8.8,HIGH,0.0008399999933317304,false,,false,false,false,,,false,false,,2024-12-19T15:15:00.000Z,0 CVE-2024-9779,https://securityvulnerability.io/vulnerability/CVE-2024-9779,Vulnerability in Open Cluster Management Impacting Cluster-Manager Deployments,"CVE-2024-9779 is a critical vulnerability found within Open Cluster Management (OCM) that allows unauthorized access to cluster-manager deployments. If an attacker gains access to a worker node, they can exploit this flaw due to a permissive service account configuration. The cluster-manager deployment utilizes a service account sharing its name with the ClusterRole, granting permissions to create Pod resources. An attacker controlling a node can obtain the sensitive cluster-manager token, allowing them to access and manipulate the entire cluster by mounting malicious service accounts. This poses a significant risk to the confidentiality, integrity, and availability of managed clusters, necessitating immediate attention and remediation.",Red Hat,,7.5,HIGH,0.000539999979082495,false,,false,false,false,,,false,false,,2024-12-17T23:15:00.000Z,0 CVE-2024-12397,https://securityvulnerability.io/vulnerability/CVE-2024-12397,Cookies vulnerability could lead to unauthorized data access or modification,"A vulnerability in Quarkus-HTTP has been identified, where improper parsing of cookies occurs due to certain value-delimiting characters in HTTP requests. This issue enables attackers to create specially crafted cookie values that could facilitate the exfiltration of HttpOnly cookie values or allow the spoofing of arbitrary additional cookie values. These actions may lead to unauthorized access or alterations of sensitive data, significantly affecting the confidentiality and integrity of the data being handled.",Red Hat,"Cryostat 3,Red Hat Build Of Apache Camel For Quarkus,Red Hat Build Of Apache Camel - Hawtio,Red Hat Build Of Apicurio Registry,Red Hat Build Of Keycloak,Red Hat Build Of Optaplanner 8,Red Hat Build Of Quarkus,Red Hat Fuse 7,Red Hat Integration Camel K,Red Hat Jboss Enterprise Application Platform 8,Red Hat Jboss Enterprise Application Platform Expansion Pack,Red Hat Process Automation 7,Streams For Apache Kafka",7.4,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2024-12-12T09:05:28.451Z,0 CVE-2022-2232,https://securityvulnerability.io/vulnerability/CVE-2022-2232,Keycloak Package Vulnerability: LDAP Injection Flaw Discovered,"A vulnerability exists within the Keycloak package that enables an attacker to exploit LDAP injection techniques. This flaw permits the circumvention of username lookups, potentially allowing the execution of unauthorized queries or actions in the system. If an attacker is able to leverage this vulnerability, it could lead to unauthorized access and compromise of sensitive information. System administrators are encouraged to review the impacted versions and implement recommended updates to mitigate the risk.",Red Hat,Red Hat Single Sign-on 7,7.5,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2024-11-14T14:51:14.594Z,0 CVE-2024-10963,https://securityvulnerability.io/vulnerability/CVE-2024-10963,Pam_Access Vulnerability: Bypassing Access Restrictions through Token Manipulation,"A vulnerability exists in PAM Access whereby certain entries in its configuration file can be incorrectly recognized as hostnames. This flaw enables attackers to masquerade as legitimate hostnames, potentially leading to unauthorized access to services and terminals. Systems leveraging PAM Access for managing user authentication could be compromised due to this misconfiguration issue, creating a significant risk for organizations relying on these security measures.",Red Hat,"Red Hat Enterprise Linux 7,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.4,HIGH,0.000910000002477318,false,,false,false,false,,,false,false,,2024-11-07T16:02:34.873Z,0 CVE-2023-1973,https://securityvulnerability.io/vulnerability/CVE-2023-1973,Server Denial of Service Vulnerability Discovered in Undertow's FormAuthenticationMechanism,"A vulnerability exists in the Undertow package, specifically within the FormAuthenticationMechanism. A malicious user can exploit this flaw by sending specially crafted requests to the server. This action could lead to a Denial of Service condition, causing the server to encounter an OutOfMemory error and exhausting its available memory resources. This vulnerability poses significant risks to application stability and overall service availability.",Red Hat,"Red Hat Jboss Enterprise Application Platform 7,Red Hat Jboss Enterprise Application Platform 7.4 For Rhel 8,Red Hat Jboss Enterprise Application Platform 7.4 For Rhel 9,Red Hat Jboss Enterprise Application Platform 7.4 On Rhel 7,Red Hat Jboss Enterprise Application Platform 8,Red Hat Jboss Enterprise Application Platform 8.0 For Rhel 8,Red Hat Jboss Enterprise Application Platform 8.0 For Rhel 9",7.5,HIGH,0.0010900000343099236,false,,false,false,false,,,false,false,,2024-11-07T10:01:57.995Z,0 CVE-2024-6861,https://securityvulnerability.io/vulnerability/CVE-2024-6861,Sensitive Information Disclosure in Foreman via GraphQL API,"A vulnerability exists in Foreman that allows attackers to exploit the GraphQL API when the introspection feature is enabled. This flaw can lead to the unauthorized retrieval of sensitive admin authentication keys. The exposure of these keys could enable attackers to compromise the integrity of the entire API, potentially leading to further exploitation of the system. Organizations using Foreman must ensure their GraphQL configurations are secured to prevent this critical information leak.",Red Hat,,7.5,HIGH,0.0006000000284984708,false,,false,false,false,,,false,false,,2024-11-06T15:15:00.000Z,0 CVE-2024-9632,https://securityvulnerability.io/vulnerability/CVE-2024-9632,"X.org Server Flaw Allows Buffer Overflow, Denial of Service or Privilege Escalation","A flaw exists in the X.org server that stems from an improper handling of allocation size in the _XkbSetCompatMap function. This vulnerability allows a local attacker to potentially exploit this issue by sending a specially crafted payload, which could result in a buffer overflow condition. If successfully exploited, this vulnerability may lead to denial of service or enable local privilege escalation in environments where the X.org server operates with elevated permissions, specifically with root access. It is crucial for administrators to review their configurations and apply necessary security updates to mitigate the risks associated with this vulnerability.",Red Hat,",Red Hat Enterprise Linux 7 Extended Lifecycle Support,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 9.4 Extended Update Support,Red Hat Enterprise Linux 6,Red Hat Enterprise Linux 7",7.8,HIGH,0.0004400000034365803,false,,false,false,false,,,false,false,,2024-10-30T07:42:35.320Z,0 CVE-2024-10295,https://securityvulnerability.io/vulnerability/CVE-2024-10295,Unauthorized Access via Malformed Basic Authentication in APICast,"A vulnerability exists in Red Hat's Gateway impacting its ability to authenticate requests correctly. When a non-base64 encoded basic authentication header contains special characters, the APICast service fails to carry out the necessary authentication checks due to an oversight in the base64 decoding process. This flaw enables unauthorized users to access backend systems by circumventing standard authentication mechanisms, exposing critical resources to potential threats.",Red Hat,Red Hat 3scale Api Management Platform 2,7.5,HIGH,0.0008699999889358878,false,,false,false,false,,,false,false,,2024-10-24T17:55:10.314Z,0 CVE-2024-9050,https://securityvulnerability.io/vulnerability/CVE-2024-9050,Networkmanager-libreswan: local privilege escalation via leftupdown,"A security flaw exists in the libreswan client plugin for NetworkManager, specifically within its handling of VPN configurations. This vulnerability arises from improper sanitation of the configuration input provided by local unprivileged users. This key-value format configuration management fails to adequately escape special characters, causing the application to misinterpret values as keys. This misconfiguration could allow malicious actors to manipulate key parameters such as 'leftupdown', which is capable of running executable commands. Because NetworkManager employs Polkit to permit unprivileged users to alter system network settings, an attacker could escalate privileges locally, potentially leading to root-level code execution on the affected system by crafting a malicious configuration.",Red Hat,"Red Hat Enterprise Linux 7.7 Advanced Update Support,Red Hat Enterprise Linux 7 Extended Lifecycle Support,Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 8.2 Advanced Update Support,Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.4 Telecommunications Update Service,Red Hat Enterprise Linux 8.4 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support,Red Hat Enterprise Linux 8.6 Telecommunications Update Service,Red Hat Enterprise Linux 8.6 Update Services For SAP Solutions,Red Hat Enterprise Linux 8.8 Extended Update Support,Red Hat Enterprise Linux 9.0 Update Services For SAP Solutions,Red Hat Enterprise Linux 9.2 Extended Update Support,Red Hat Enterprise Linux 9",7.8,HIGH,0.0004600000102072954,false,,false,false,false,,,false,false,,2024-10-22T13:15:00.000Z,0 CVE-2024-7207,https://securityvulnerability.io/vulnerability/CVE-2024-7207,Envoy Proxy Vulnerability Allows Header Manipulation and Request Forgery,"The vulnerability identified has been marked as a duplicate of CVE-2024-45806, suggesting a redundancy in reporting. However, it is critical to monitor and address any existing weaknesses in Envoy Proxy that may arise from overlapping vulnerabilities. Users and system administrators should stay informed about security advisories from the Envoy Project to ensure all systems running Envoy are updated and compliant with the latest security practices.",Red Hat,Openshift Service Mesh 2,9.8,CRITICAL,0.0004299999854993075,false,,false,false,false,,,false,false,,2024-09-19T22:17:51.582Z,0 CVE-2024-8698,https://securityvulnerability.io/vulnerability/CVE-2024-8698,Flaw in SAML Signature Validation Method Allows Privilege Escalation or Impersonation Attacks,"CVE-2024-8698 is a privilege escalation and impersonation vulnerability located in the SAML signature validation method within the Keycloak XMLSignatureUtil class. The vulnerability allows attackers to create crafted responses that can bypass validation, potentially leading to privilege escalation or impersonation attacks. The impact of the exploitation can have a high impact on confidentiality, with lower impacts on integrity and availability. The vulnerability is addressed in Keycloak version 25.0.6 and organizations using Keycloak are strongly recommended to install updates as soon as possible. It is also recommended to implement updates from other vendors who rely on Keycloak for identity and access management. Upgrading to the newest version may provide safety from future exploitation, but it does not remediate historic compromise. At the time of reporting, no active exploitation of this vulnerability by ransomware groups was reported.",Red Hat,"Red Hat Build Of Keycloak,Red Hat Build Of Keycloak 22,Red Hat Build Of Keycloak 24,Red Hat Jboss Enterprise Application Platform 8,Red Hat Jboss Enterprise Application Platform 8.0 For Rhel 8,Red Hat Jboss Enterprise Application Platform 8.0 For Rhel 9,Red Hat Single Sign-on 7,Red Hat Single Sign-on 7.6 For Rhel 7,Red Hat Single Sign-on 7.6 For Rhel 8,Red Hat Single Sign-on 7.6 For Rhel 9,Rhel-8 Based Middleware Containers",7.7,HIGH,0.0007099999929778278,false,,true,false,true,2024-09-25T18:56:46.000Z,true,false,false,,2024-09-19T15:48:18.464Z,0 CVE-2024-8509,https://securityvulnerability.io/vulnerability/CVE-2024-8509,Forklift Controller Vulnerability: Missing Authorization Header Security,"A vulnerability exists in Forklift Controller that allows attackers to bypass authorization measures by leveraging bearer token authentication. The system does not perform robust verification against the Authorization header, which can lead to unauthorized access. Specifically, if a valid bearer token is supplied, the system will return a success response (HTTP 200) along with the requested data. Without a valid token, a 401 Unauthorized response is issued. This oversight can potentially expose sensitive information and requires immediate attention from users to bolster security measures.",Red Hat,",Migration Toolkit For Virtualization 2.6",7.5,HIGH,0.00044999999227002263,false,,false,false,false,,,false,false,,2024-09-06T15:17:49.225Z,0 CVE-2024-8418,https://securityvulnerability.io/vulnerability/CVE-2024-8418,Containers/aardvark-dns: tcp query handling flaw in aardvark-dns leading to denial of service,"Aardvark-dns has a vulnerability that allows attackers to conduct Denial of Service (DoS) attacks through improper handling of TCP DNS queries. The flaw arises from the serial processing of these queries, which permits an attacker to maintain a TCP connection indefinitely. This behavior can lead to the DNS server becoming unresponsive as legitimate queries time out, greatly affecting DNS service availability and disrupting normal operations for users.",Red Hat,"Red Hat Enterprise Linux 8,Red Hat Enterprise Linux 9,Red Hat Openshift Container Platform 4",7.5,HIGH,0.0005200000014156103,false,,false,false,false,,,false,false,,2024-09-04T15:15:00.000Z,0 CVE-2024-7923,https://securityvulnerability.io/vulnerability/CVE-2024-7923,Pulpcore Authentication Bypass Vulnerability Affects Satellite Deployments,"An authentication bypass vulnerability has been identified in Pulpcore, particularly affecting deployments running with Gunicorn versions prior to 22.0. This vulnerability is caused by the puppet-pulpcore configuration and Apache's mod_proxy failing to properly unset headers, which restricts underscores in HTTP headers. As a result, unauthorized users can exploit this flaw to gain administrative access to systems. The issue impacts all active Satellite deployments (versions 6.13, 6.14, and 6.15) that utilize Pulpcore version 3.0 and above. Organizations using these systems are strongly advised to review their configurations and implement necessary security measures.",Red Hat,"Red Hat Satellite 6.13 For Rhel 8,Red Hat Satellite 6.14 For Rhel 8,Red Hat Satellite 6.15 For Rhel 8",9.8,CRITICAL,0.0012400000123307109,false,,false,false,false,,,false,false,,2024-09-04T14:15:00.000Z,0 CVE-2024-7885,https://securityvulnerability.io/vulnerability/CVE-2024-7885,Undertow ProxyProtocolReadListener Vulnerability,"A notable vulnerability exists in the Undertow HTTP server related to the handling of multiple requests over the same HTTP connection. The issue stemmed from the misuse of a shared StringBuilder instance within the ProxyProtocolReadListener, specifically during the process of handling requests in the parseProxyProtocolV1 method. This flaw can lead to information leakage, where sensitive data from a preceding request may be inadvertently included in a subsequent response. The consequence is not only potential data exposure but also issues with connection stability, as errors may arise during processing, affecting overall application performance in environments that handle multiple requests concurrently.",Red Hat,"Red Hat Build Of Apache Camel 3.20.7 For Spring Boot,Red Hat Build Of Apache Camel 4.4.2 For Spring Boot,Red Hat Jboss Enterprise Application Platform 7.1.0,Red Hat Jboss Enterprise Application Platform 7.4 For Rhel 8,Red Hat Jboss Enterprise Application Platform 7.4 For Rhel 9,Red Hat Jboss Enterprise Application Platform 7.4 On Rhel 7,Red Hat Jboss Enterprise Application Platform 8,Red Hat Jboss Enterprise Application Platform 8.0 For Rhel 8,Red Hat Jboss Enterprise Application Platform 8.0 For Rhel 9,Red Hat Build Of Apache Camel For Spring Boot,Red Hat Build Of Apache Camel - Hawtio,Red Hat Build Of Keycloak,Red Hat Build Of Quarkus,Red Hat Data Grid 8,Red Hat Integration Camel K,Red Hat Jboss Data Grid 7,Red Hat Jboss Enterprise Application Platform Expansion Pack,Red Hat Jboss Fuse 7,Red Hat Process Automation 7,Red Hat Single Sign-on 7",7.5,HIGH,0.0009800000116229057,false,,false,false,false,,,false,false,,2024-08-21T14:13:36.579Z,0