Tag
Multiple vulnerabilities in Apache Camel, Red Hat Enterprise Linux, and Red Hat Integration could allow an attacker to execute arbitrary code and bypass security measures.