Red Hat 3scale Vulnerabilities