| Use After Free | |
| OS Command Injection | |
| CVE-2023-30588 | |
| Integer Overflow or Wraparound | |
| CVE-2023-30589 | |
| Improper Validation of Integrity Check Value | |
| CVE-2023-30590 | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Numeric Truncation Error | <1:22.16.0-2.module+el8.10.0+23338+c5a38893 |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| CVE-2023-30581 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| HTTP Request Smuggling | |
| Uncaught Exception | <1:22.16.0-1.module+el8.10.0+23140+4056b950 |
| Memory Leak | <1:22.16.0-1.module+el8.10.0+23140+4056b950 |
| Memory Leak | |
| Buffer Under-read | |
| HTTP Request Smuggling | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Heap-based Buffer Overflow | <1:22.15.0-1.module+el8.10.0+23068+28ff2340 |
| Integer Overflow or Wraparound | |
| Use After Free | <1:22.15.0-1.module+el8.10.0+23068+28ff2340 |
| Detection of Error Condition Without Action | |
| Resource Exhaustion | <1:22.13.1-1.module+el8.10.0+22759+46b58560 |
| Incorrect Authorization | <1:22.13.1-1.module+el8.10.0+22759+46b58560 |
| Use of Insufficiently Random Values | <1:22.13.1-1.module+el8.10.0+22759+46b58560 |