Red Hat Keycloak Core Vulnerabilities