| Server-Side Request Forgery (SSRF) | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Certificate Validation | |
| CVE-2025-58186 | |
| Out-of-bounds Read | |
| Excessive Platform Resource Consumption within a Loop | |
| Resource Exhaustion | |
| Missing Reference to Active Allocated Resource | |
| Incorrect Execution-Assigned Permissions | |
| Reachable Assertion | |
| Reachable Assertion | <4:4.9.4-27.module+el8.10.0+23863+d7fda2d7 |
| Link Following | <4:4.9.4-23.module+el8.10.0+23647+cfd78660 |
| Link Following | <4:4.9.4-23.module+el8.10.0+23647+cfd78660 |
| Creation of Immutable Text Using String Concatenation | |
| Allocation of Resources Without Limits or Throttling | <4:4.9.4-24.module+el8.10.0+23772+e5018371 |
| Link Following | <4:4.9.4-23.module+el8.10.0+23647+cfd78660 |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Allocation of Resources Without Limits or Throttling | |
| Improper Output Neutralization for Logs | |
| Expected Behavior Violation | |
| Expected Behavior Violation | |
| Incorrect Resource Transfer Between Spheres | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
| Creation of Temporary File With Insecure Permissions | <4:4.9.4-23.module+el8.10.0+23498+f7d19d48 |
| Directory Traversal | <4:4.9.4-23.module+el8.10.0+23498+f7d19d48 |
| Allocation of Resources Without Limits or Throttling | |
| Race Condition | |
| Time-of-check Time-of-use (TOCTOU) | |
| CVE-2025-4673 | |
| Improper Certificate Validation | <4:4.9.4-22.module+el8.10.0+23320+f7205097 |
| Cross-site Scripting (XSS) | |
| HTTP Request Smuggling | <4:4.9.4-20.module+el8.10.0+23250+94af2c8e |
| Incorrect Authorization | |
| Incorrect Authorization | |
| Improper Input Validation | |
| Allocation of Resources Without Limits or Throttling | <4:4.9.4-20.module+el8.10.0+22931+799fd806 |
| Improper Privilege Management | <4:4.9.4-19.module+el8.10.0+22744+7794713b |
| Directory Traversal | <4:4.9.4-15.module+el8.10.0+22397+e3c95ba6 |
| Link Following | <4:4.9.4-15.module+el8.10.0+22397+e3c95ba6 |
| Directory Traversal | <4:4.9.4-18.module+el8.10.0+22417+2fb00970 |
| Information Exposure | |
| Improper Authorization | |
| Improper Verification of Cryptographic Signature | |
| Information Exposure | |
| Use of Uninitialized Variable | |
| Improper Input Validation | <4:4.9.4-15.module+el8.10.0+22397+e3c95ba6 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
| Uncontrolled Recursion | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
| Uncontrolled Recursion | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
| Improperly Controlled Sequential Memory Allocation | <4:4.9.4-13.module+el8.10.0+22346+28c02849 |
| Resource Exhaustion | |
| Allocation of Resources Without Limits or Throttling | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
| Improper Input Validation | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
| Information Exposure Through Log Files | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
| Improper Input Validation | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
| Information Exposure | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Information Exposure | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Improper Validation of Integrity Check Value | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
| Memory Leak | <4:4.9.4-12.module+el8.10.0+22202+761b9a65 |
| Link Following | <3:4.6.1-9.module+el8.9.0+21697+6a5e98e7 |
| Improper Handling of Highly Compressed Data (Data Amplification) | <4:4.9.4-3.module+el8.10.0+21974+acd2159c |
| Resource Exhaustion | <4:4.9.4-3.module+el8.10.0+21974+acd2159c |
| Misinterpretation of Input | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
| Improper Input Validation | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Improper Input Validation | <4:4.9.4-13.module+el8.10.0+22283+6d6d094a |
| Information Exposure | <2:4.0.2-26.module+el8.9.0+21242+944321bb |
| Improper Check for Unusual or Exceptional Conditions | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Truncation of Security-relevant Information | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Information Exposure | <2:4.0.2-26.module+el8.9.0+21242+944321bb |
| Resource Exhaustion | <2:4.0.2-26.module+el8.9.0+21242+944321bb |
| Authentication Bypass by Primary Weakness | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Path Equivalence | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Incorrect Default Permissions | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Buffer Access with Incorrect Length Value | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Cross-site Scripting (XSS) | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Allocation of Resources Without Limits or Throttling | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Cross-site Scripting (XSS) | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Cross-site Scripting (XSS) | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Resource Exhaustion | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| HTTP Response Splitting | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Improper Handling of Unicode Encoding | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Improper Handling of Unicode Encoding | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Improper Handling of Unicode Encoding | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Resource Exhaustion | |
| Arbitrary Code Injection | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Resource Exhaustion | |
| Placement of User into Incorrect Group | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Time-of-check Time-of-use (TOCTOU) | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Resource Exhaustion | <3:4.6.1-4.module+el8.9.0+19761+326da906 |
| Allocation of Resources Without Limits or Throttling | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Link Following | |
| Directory Traversal | |
| Algorithmic Complexity | |
| CVE-2022-41715 | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Allocation of Resources Without Limits or Throttling | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| HTTP Request Smuggling | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Resource Exhaustion | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Placement of User into Incorrect Group | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
| Placement of User into Incorrect Group | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Resource Exhaustion | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Information Exposure | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improperly Controlled Sequential Memory Allocation | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| HTTP Request Smuggling | <2:4.0.2-20.module+el8.8.0+18201+6ad7332c |
| Improper Input Validation | |
| Authentication Bypass by Primary Weakness | |
| Incorrect Default Permissions | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
| Insufficient Entropy | <3:4.4.1-8.module+el8.8.0+18438+15d3aa65 |
| Allocation of Resources Without Limits or Throttling | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
| Improper Preservation of Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
| Incorrect Default Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
| Incorrect Default Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
| Incorrect Default Permissions | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |
| Missing Release of Resource after Effective Lifetime | |
| Use of a Broken or Risky Cryptographic Algorithm | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
| Information Exposure | <4:4.9.4-18.module+el8.10.0+22417+2fb00970 |
| Access of Resource Using Incompatible Type ('Type Confusion') | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
| Race Condition | <3:4.2.0-1.module+el8.7.0+16772+33343656 |
| Resource Exhaustion | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Time-of-check Time-of-use (TOCTOU) | <0:3.0.1-6.module+el8.4.0+11310+8c67a752 |
| Origin Validation Error | <0:3.0.1-6.module+el8.4.0+10607+f4da7515 |
| Improper Cross-boundary Removal of Sensitive Data | <0:2.2.1-7.module+el8.3.1+9857+68fb1526 |
| Loop with Unreachable Exit Condition ('Infinite Loop') | |
| Resource Exhaustion | |
| Incorrect Calculation | |
| NULL Pointer Dereference | <0:3.0.1-6.module+el8.4.0+10607+f4da7515 |
| Improper Certificate Validation | |
| Information Exposure | <0:3.3.1-9.module+el8.5.0+12697+018f24d7 |
| Improper Input Validation | <3:4.9.4-0.1.module+el8.10.0+21350+ea09fba1 |
| Improper Locking | <0:3.3.1-9.module+el8.5.0+12697+018f24d7 |
| Improper Input Validation | |
| Use After Free | |
| Improper Validation of Array Index | |
| Improper Validation of Array Index | <2:4.0.2-6.module+el8.6.0+14673+621cb8be |