| Allocation of Resources Without Limits or Throttling | |
| Improper Validation of Unsafe Equivalence in Input | |
| Time-of-check Time-of-use (TOCTOU) | |
| Allocation of Resources Without Limits or Throttling | |
| Cross-site Scripting (XSS) | |
| Excessive Platform Resource Consumption within a Loop | |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Out-of-bounds Read | |
| Incorrect Calculation of Buffer Size | |
| Incorrect Behavior Order: Authorization Before Parsing and Canonicalization | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Validation of Syntactic Correctness of Input | |
| Improper Certificate Validation | |
| NULL Pointer Dereference | |
| Allocation of Resources Without Limits or Throttling | <2:1-82.module+el8.10.0+24081+a04d358a |
| CVE-2025-68121 | <2:1-82.module+el8.10.0+24081+a04d358a |
| Directory Traversal | |
| Allocation of Resources Without Limits or Throttling | <2:1-82.module+el8.10.0+24081+a04d358a |
| Server-Side Request Forgery (SSRF) | |
| Reachable Assertion | <2:1-82.module+el8.10.0+23863+d7fda2d7 |
| Allocation of Resources Without Limits or Throttling | |
| Improper Certificate Validation | |
| CVE-2025-58186 | |
| Out-of-bounds Read | |
| Excessive Platform Resource Consumption within a Loop | |
| Resource Exhaustion | <2:1-82.module+el8.10.0+23963+b64d8032 |
| Missing Reference to Active Allocated Resource | |
| Incorrect Execution-Assigned Permissions | |
| Reachable Assertion | |
| Creation of Temporary File With Insecure Permissions | <2:1-82.module+el8.10.0+23498+f7d19d48 |
| Link Following | <2:1-82.module+el8.10.0+23647+cfd78660 |
| Link Following | <2:1-82.module+el8.10.0+23647+cfd78660 |
| Creation of Immutable Text Using String Concatenation | |
| Allocation of Resources Without Limits or Throttling | <2:1-82.module+el8.10.0+23772+e5018371 |
| Link Following | <2:1-82.module+el8.10.0+23647+cfd78660 |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Output Neutralization for Logs | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Incorrect Resource Transfer Between Spheres | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Directory Traversal | <2:1-82.module+el8.10.0+23498+f7d19d48 |
| Allocation of Resources Without Limits or Throttling | |
| Time-of-check Time-of-use (TOCTOU) | |
| External Control of System or Configuration Setting | |
| Improper Certificate Validation | <2:1-82.module+el8.10.0+23320+f7205097 |
| CVE-2025-4673 | |
| Improper Validation of Array Index | <2:1-27.module+el8.6.0+14673+621cb8be |
| HTTP Request Smuggling | <2:1-82.module+el8.10.0+23250+94af2c8e |
| Allocation of Resources Without Limits or Throttling | <2:1-82.module+el8.10.0+22931+799fd806 |
| Improper Input Validation | |
| Improper Privilege Management | <2:1-82.module+el8.10.0+22417+2fb00970 |
| Directory Traversal | <2:1-82.module+el8.10.0+22397+e3c95ba6 |
| Improper Input Validation | <2:1-82.module+el8.10.0+22397+e3c95ba6 |
| Link Following | <2:1-82.module+el8.10.0+22397+e3c95ba6 |
| Improperly Controlled Sequential Memory Allocation | <2:1-82.module+el8.10.0+22346+28c02849 |
| Uncontrolled Recursion | <2:1-82.module+el8.10.0+22346+28c02849 |
| Directory Traversal | <2:1-82.module+el8.10.0+22417+2fb00970 |
| Information Exposure | <2:1-82.module+el8.10.0+22417+2fb00970 |
| Information Exposure | |
| Improper Verification of Cryptographic Signature | |
| Information Exposure | |
| Use of Uninitialized Variable | |
| Uncontrolled Recursion | <2:1-82.module+el8.10.0+22346+28c02849 |
| Allocation of Resources Without Limits or Throttling | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Improper Input Validation | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Improper Input Validation | <2:1-82.module+el8.10.0+22283+6d6d094a |
| Information Exposure Through Log Files | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Improper Check for Unusual or Exceptional Conditions | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Truncation of Security-relevant Information | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Information Exposure | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Information Exposure | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Improper Validation of Integrity Check Value | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <2:1-82.module+el8.10.0+22283+6d6d094a |
| Link Following | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Memory Leak | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Improper Handling of Highly Compressed Data (Data Amplification) | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Resource Exhaustion | <2:1-81.module+el8.10.0+21962+8143777b |
| Misinterpretation of Input | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Improper Input Validation | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Arbitrary Code Injection | <2:1-82.module+el8.10.0+23963+b64d8032 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Improper Certificate Validation | <2:1-82.module+el8.10.0+22202+761b9a65 |
| Information Exposure | <2:1-71.module+el8.9.0+21243+a586538b |
| Information Exposure | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Resource Exhaustion | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Cross-site Scripting (XSS) | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Authentication Bypass by Primary Weakness | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Path Equivalence | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Incorrect Default Permissions | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Buffer Access with Incorrect Length Value | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Cross-site Scripting (XSS) | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Allocation of Resources Without Limits or Throttling | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Cross-site Scripting (XSS) | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Resource Exhaustion | <2:1-81.module+el8.10.0+21340+c6c7475a |
| HTTP Response Splitting | <2:1-38.module+el8.9.0+20325+b2853e6e |
| Improper Handling of Unicode Encoding | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Improper Handling of Unicode Encoding | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Improper Handling of Unicode Encoding | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Resource Exhaustion | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Arbitrary Code Injection | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Resource Exhaustion | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Resource Exhaustion | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Resource Exhaustion | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Resource Exhaustion | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Placement of User into Incorrect Group | <2:1-54.module+el8.9.0+19761+326da906 |
| Time-of-check Time-of-use (TOCTOU) | <2:1-37.module+el8.8.0+17954+9046de88 |
| Resource Exhaustion | <2:1-38.module+el8.9.0+19098+6e7a5e3f |
| Allocation of Resources Without Limits or Throttling | <2:1-37.module+el8.8.0+17954+9046de88 |
| CVE-2022-41715 | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Allocation of Resources Without Limits or Throttling | <2:1-81.module+el8.10.0+21340+c6c7475a |
| HTTP Request Smuggling | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Resource Exhaustion | <2:1-38.module+el8.9.0+20656+56f336b9 |
| Placement of User into Incorrect Group | <2:1-40.module+el8.7.0+16772+33343656 |
| Placement of User into Incorrect Group | <2:1-37.module+el8.8.0+17954+9046de88 |
| Resource Exhaustion | <2:1-37.module+el8.8.0+17954+9046de88 |
| Information Exposure | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improperly Controlled Sequential Memory Allocation | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improperly Controlled Sequential Memory Allocation | <2:1-37.module+el8.8.0+17954+9046de88 |
| Improperly Controlled Sequential Memory Allocation | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improperly Controlled Sequential Memory Allocation | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improperly Controlled Sequential Memory Allocation | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improperly Controlled Sequential Memory Allocation | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improperly Controlled Sequential Memory Allocation | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| HTTP Request Smuggling | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Incorrect Default Permissions | <2:1-40.module+el8.7.0+16772+33343656 |
| Insufficient Entropy | <2:1-63.module+el8.8.0+18438+15d3aa65 |
| Allocation of Resources Without Limits or Throttling | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Improper Preservation of Permissions | <2:1-27.module+el8.6.0+14673+621cb8be |
| Incorrect Default Permissions | <2:1-27.module+el8.6.0+14673+621cb8be |
| Incorrect Default Permissions | <2:1-27.module+el8.6.0+14673+621cb8be |
| Incorrect Default Permissions | <2:1-27.module+el8.6.0+14673+621cb8be |
| Missing Release of Resource after Effective Lifetime | <1:1.2.4-2.module+el8.7.0+16212+65e1b35f |
| Use of a Broken or Risky Cryptographic Algorithm | <2:1-40.module+el8.7.0+16772+33343656 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <2:1-40.module+el8.7.0+16772+33343656 |
| Race Condition | <2:1-40.module+el8.7.0+16772+33343656 |
| Resource Exhaustion | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Time-of-check Time-of-use (TOCTOU) | <1:1.2.2-7.module+el8.4.0+11310+8c67a752 |
| Origin Validation Error | <1:1.2.2-8.module+el8.4.0+10607+f4da7515 |
| Improper Cross-boundary Removal of Sensitive Data | <1:1.2.0-9.module+el8.3.1+9857+68fb1526 |
| Man-in-the-Middle (MitM) | <1:1.1.1-3.module+el8.3.0+8221+97165c3f |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <1:1.1.1-3.module+el8.3.0+8221+97165c3f |
| Incorrect Authorization | <1:1.0.0-1.module+el8.2.1+6676+604e1b26 |
| Directory Traversal | <1:0.1.40-9.module+el8.2.0+6373+4950d421 |
| Path Equivalence | <1:0.1.40-10.module+el8.2.0+5955+6cd70ceb |
| Files or Directories Accessible to External Parties | <1:0.1.40-10.module+el8.2.0+5955+6cd70ceb |
| Resource Exhaustion | <1:0.1.40-10.module+el8.2.0+5955+6cd70ceb |
| Heap-based Buffer Overflow | <1:0.1.40-8.module+el8.1.1+5351+506397b0 |
| Heap-based Buffer Overflow | <1:0.1.40-8.module+el8.1.1+5351+506397b0 |
| Use After Free | <1:0.1.40-8.module+el8.1.1+5351+506397b0 |
| Path Equivalence | <1:0.1.37-6.module+el8.1.0+4876+e678a192 |
| Link Following | <1:0.1.37-6.module+el8.1.0+4876+e678a192 |
| Use After Free | <1:1.0.0-1.module+el8.2.1+6676+604e1b26 |
| Incorrect Calculation | |
| NULL Pointer Dereference | <1:1.2.2-8.module+el8.4.0+10607+f4da7515 |
| Improper Certificate Validation | <1:0.1.41-4.module+el8.3.0+10188+4c10031c |
| Out-of-bounds Read | <1:1.1.1-3.module+el8.3.0+8221+97165c3f |
| Heap-based Buffer Overflow | <1:0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183 |
| Improper Enforcement of Behavioral Workflow | <1:0.1.37-5.module+el8.1.0+4240+893c1ab8 |
| Insufficiently Protected Credentials | <1:0.1.32-5.git1715c90.module+el8.1.0+4241+a7060183 |
| Resource Exhaustion | <1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c |
| Resource Exhaustion | <1:0.1.32-6.git1715c90.module+el8.1.0+4903+9bde5d6c |
| Operation on a Resource after Expiration or Release | <1:0.1.32-3.git1715c90.module+el8.0.0+2958+4e823551 |
| Information Exposure | <1:1.2.2-10.module+el8.5.0+11808+4e1db630 |
| Improper Input Validation | <2:1-81.module+el8.10.0+21340+c6c7475a |
| Improper Locking | <2:1-2.module+el8.5.0+12582+56d94c81 |
| Use After Free | |