Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 07 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 07 Nov 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 06 Nov 2025 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in the 3scale developer portal. This issue can allow account creation or updates passed through hidden or read-only fields, the contents of which may be altered. This flaw allows an attacker to access or modify restricted information. | |
| Title | 3scale-porta: readonly fields not validated server-side | |
| First Time appeared |
Redhat
Redhat red Hat 3scale Amp |
|
| Weaknesses | CWE-281 | |
| CPEs | cpe:/a:redhat:red_hat_3scale_amp:2 | |
| Vendors & Products |
Redhat
Redhat red Hat 3scale Amp |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-07T15:14:34.402Z
Reserved: 2024-12-03T23:56:18.327Z
Link: CVE-2024-12125
Updated: 2025-11-07T15:14:31.603Z
Status : Received
Published: 2025-11-06T22:15:37.110
Modified: 2025-11-06T22:15:37.110
Link: CVE-2024-12125
OpenCVE Enrichment
No data.