HTTP Request Smuggling | |
Incorrect Authorization | |
Incorrect Authorization | |
Improper Input Validation | |
Allocation of Resources Without Limits or Throttling | <4:4.9.4-20.module+el8.10.0+22931+799fd806 |
Improper Privilege Management | <4:4.9.4-19.module+el8.10.0+22744+7794713b |
Directory Traversal | <4:4.9.4-15.module+el8.10.0+22397+e3c95ba6 |
Link Following | <4:4.9.4-15.module+el8.10.0+22397+e3c95ba6 |
Directory Traversal | <4:4.9.4-18.module+el8.10.0+22417+2fb00970 |
Information Exposure | |
Improper Authorization | |
Improper Verification of Cryptographic Signature | |
Allocation of Resources Without Limits or Throttling | |
Information Exposure | |
Use of Uninitialized Variable | |
Improper Input Validation | <4:4.9.4-15.module+el8.10.0+22397+e3c95ba6 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
Uncontrolled Recursion | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
Uncontrolled Recursion | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
Improperly Controlled Sequential Memory Allocation | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
Resource Exhaustion | |
Allocation of Resources Without Limits or Throttling | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
Improper Input Validation | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
Information Exposure Through Log Files | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
Improper Input Validation | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
Information Exposure | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
Information Exposure | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
Improper Validation of Integrity Check Value | |
Memory Leak | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
Link Following | <4:4.9.4-1.module+el8.10.0+21632+761e0d34 |
Improper Handling of Highly Compressed Data (Data Amplification) | <4:4.9.4-1.module+el8.10.0+21632+761e0d34 |
Resource Exhaustion | <4:4.9.4-3.module+el8.10.0+21974+acd2159c |
Misinterpretation of Input | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
Improper Input Validation | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Improper Input Validation | |
Information Exposure | <3:4.6.1-8.module+el8.9.0+21243+a586538b |
Improper Check for Unusual or Exceptional Conditions | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
Truncation of Security-relevant Information | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
Information Exposure | <2:4.0.2-26.module+el8.9.0+21242+944321bb |
Resource Exhaustion | <2:4.0.2-26.module+el8.9.0+21242+944321bb |
Authentication Bypass by Primary Weakness | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Path Equivalence | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Incorrect Default Permissions | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
CVE-2023-39321 | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
Cross-site Scripting (XSS) | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
Allocation of Resources Without Limits or Throttling | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
Cross-site Scripting (XSS) | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
Cross-site Scripting (XSS) | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Resource Exhaustion | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
HTTP Response Splitting | <2:4.0.2-24.module+el8.9.0+20325+b2853e6e |
Improper Handling of Unicode Encoding | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Improper Handling of Unicode Encoding | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Improper Handling of Unicode Encoding | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Loop with Unreachable Exit Condition ('Infinite Loop') | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Resource Exhaustion | |
Arbitrary Code Injection | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Resource Exhaustion | |
Placement of User into Incorrect Group | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Time-of-check Time-of-use (TOCTOU) | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Resource Exhaustion | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
Allocation of Resources Without Limits or Throttling | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Link Following | |
Directory Traversal | |
Algorithmic Complexity | |
CVE-2022-41715 | <4:4.9.4-1.module+el8.10.0+21632+761e0d34 |
Allocation of Resources Without Limits or Throttling | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
HTTP Request Smuggling | <4:4.9.4-1.module+el8.10.0+21632+761e0d34 |
Resource Exhaustion | <2:4.0.2-25.module+el8.9.0+20875+8dd9d5d2 |
Placement of User into Incorrect Group | <3:4.2.0-4.module+el8.7.0+17064+3b31f55c |
Placement of User into Incorrect Group | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
Resource Exhaustion | |
Information Exposure | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improperly Controlled Sequential Memory Allocation | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
HTTP Request Smuggling | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Improper Input Validation | |
Authentication Bypass by Primary Weakness | |
Incorrect Default Permissions | <2:4.0.2-8.module+el8.7.0+16520+2db5507d |
Insufficient Entropy | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
Allocation of Resources Without Limits or Throttling | <2:4.0.2-8.module+el8.7.0+16520+2db5507d |
Improper Preservation of Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
Incorrect Default Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
Incorrect Default Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
Incorrect Default Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
Missing Release of Resource after Effective Lifetime | |
Use of a Broken or Risky Cryptographic Algorithm | <2:4.0.2-8.module+el8.7.0+16520+2db5507d |
Information Exposure | <4:4.9.4-18.module+el8.10.0+22417+2fb00970 |
Access of Resource Using Incompatible Type ('Type Confusion') | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
Race Condition | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
Resource Exhaustion | <4:4.9.4-18.module+el8.10.0+22417+2fb00970 |
Improper Cross-boundary Removal of Sensitive Data | |
Loop with Unreachable Exit Condition ('Infinite Loop') | |
Resource Exhaustion | |
Incorrect Calculation | |
Improper Certificate Validation | |
Information Exposure | <0:3.3.1-9.module+el8.5.0+12697+018f24d7 |
Improper Input Validation | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
Improper Locking | <0:3.3.1-9.module+el8.5.0+12697+018f24d7 |
Improper Input Validation | |
Use After Free | |
Improper Validation of Array Index | |
Improper Validation of Array Index | |