Multiple vulnerabilities in Red Hat Integration Camel for Spring Boot can be exploited by a remote, anonymous attacker to compromise confidentiality, availability, and integrity.
| Vendor | Product | Versions |
|---|---|---|
| red hat | red hat integration camel for spring boot | — |