| OS Command Injection | |
| CVE-2023-30588 | |
| Integer Overflow or Wraparound | |
| CVE-2023-30589 | |
| Improper Validation of Integrity Check Value | |
| CVE-2023-30590 | |
| Information Exposure | |
| Integer Overflow or Wraparound | |
| Numeric Truncation Error | <3:12.4.254.21-1.22.16.0.2.module+el8.10.0+23338+c5a38893 |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| CVE-2023-30581 | |
| Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') | |
| HTTP Request Smuggling | |
| Uncaught Exception | <3:12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950 |
| Memory Leak | <3:12.4.254.21-1.22.16.0.1.module+el8.10.0+23140+4056b950 |
| Memory Leak | |
| Buffer Under-read | |
| HTTP Request Smuggling | |
| Improper Cross-boundary Removal of Sensitive Data | |
| Heap-based Buffer Overflow | <3:12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340 |
| Integer Overflow or Wraparound | |
| Use After Free | <3:12.4.254.21-1.22.15.0.1.module+el8.10.0+23068+28ff2340 |
| Detection of Error Condition Without Action | |
| Resource Exhaustion | <3:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560 |
| Incorrect Authorization | <3:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560 |
| Use of Insufficiently Random Values | <3:12.4.254.21-1.22.13.1.1.module+el8.10.0+22759+46b58560 |