| Resource Exhaustion |  | 
| Use of Cryptographically Weak Pseudo-Random Number Generator (PRNG) |  | 
| Improper Verification of Cryptographic Signature |  | 
| Resource Exhaustion | <32:9.11.4-26.P2.el7_9.16 | 
| Resource Exhaustion | <32:9.11.4-26.P2.el7_9.16 | 
| Resource Exhaustion | <32:9.11.4-26.P2.el7_9.16 | 
| Improper Input Validation | <32:9.11.4-26.P2.el7_9.15 | 
| Allocation of Resources Without Limits or Throttling | <32:9.11.4-26.P2.el7_9.14 | 
| Improper Input Validation |  | 
| Memory Leak | <32:9.11.4-26.P2.el7_9.10 | 
| Memory Leak | <32:9.11.4-26.P2.el7_9.10 | 
| Improper Input Validation | <32:9.11.4-26.P2.el7_9.13 | 
| HTTP Request Smuggling | <32:9.11.4-26.P2.el7_9.13 | 
| Improper Input Validation |  | 
| Resource Exhaustion |  | 
| Reachable Assertion |  | 
| Use After Free |  | 
| Improper Authentication |  | 
| Improper Authentication |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| NULL Pointer Dereference |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Resource Exhaustion |  | 
| Reachable Assertion |  | 
| Reachable Assertion |  | 
| Improper Input Validation |  | 
| Improper Input Validation |  | 
| Reachable Assertion |  | 
| Missing Initialization of a Variable |  | 
| Missing Initialization of a Variable |  | 
| Resource Exhaustion |  | 
| Reachable Assertion |  | 
| Resource Exhaustion |  | 
| Unchecked Error Condition |  | 
| Resource Exhaustion |  | 
| Reachable Assertion |  | 
| Out-of-Bounds |  | 
| Improper Input Validation |  | 
| Improper Access Control |  | 
| Improper Access Control |  | 
| Reachable Assertion |  | 
| Allocation of Resources Without Limits or Throttling |  | 
| Reachable Assertion |  | 
| Improper Input Validation |  | 
| Authentication Bypass |  |