Red Hat Camel K
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in Red Hat Camel K.
Recent Red Hat Camel K Security Advisories
| Advisory | Title | Published |
|---|---|---|
| RHSA-2025:3540 | (RHSA-2025:3540) Important: Red Hat Integration Camel K 1.10.10 release and security update. | April 2, 2025 |
| RHSA-2025:1154 | (RHSA-2025:1154) Important: Red Hat Integration Camel K 1.10.9 release and security update. | February 6, 2025 |
| RHSA-2024:8339 | (RHSA-2024:8339) Important: Red Hat Integration Camel K 1.10.8 release and security update. | October 22, 2024 |
| RHSA-2024:0148 | (RHSA-2024:0148) Important: Red Hat Integration Camel K 1.10.5 release and security update | January 10, 2024 |
| RHSA-2023:6117 | (RHSA-2023:6117) Important: Red Hat Integration Camel K 1.10.4 release and security update | October 25, 2023 |
| RHSA-2023:5337 | (RHSA-2023:5337) Important: Red Hat Integration Camel K 1.10.2 release security update | September 21, 2023 |
| RHSA-2023:3906 | (RHSA-2023:3906) Important: Red Hat Integration Camel K 1.10.1 release security update | June 28, 2023 |
By the Year
In 2026 there have been 0 vulnerabilities in Red Hat Camel K. Camel K did not have any published security vulnerabilities last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 0 | 0.00 |
| 2024 | 0 | 0.00 |
| 2023 | 1 | 8.10 |
It may take a day or so for new Camel K vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Red Hat Camel K Security Vulnerabilities
Quarkus HTTP Security Policy Bypass via Unsanitized Character Permutations
CVE-2023-4853
8.1 - High
- September 20, 2023
A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.
Improper Neutralization of Input Leaders
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Red Hat Camel K or by Red Hat? Click the Watch button to subscribe.