| Missing Release of Resource after Effective Lifetime | |
| Information Exposure | |
| Improper Handling of Inconsistent Special Elements | |
| Access of Resource Using Incompatible Type ('Type Confusion') | |
| Incorrect Execution-Assigned Permissions | |
| Reversible One-Way Hash | |
| Direct Request ('Forced Browsing') | |
| Unchecked Input for Loop Condition | |
| Reachable Assertion | |
| Inefficient Regular Expression Complexity | |
| Directory Traversal | |
| Improper Handling of Highly Compressed Data (Data Amplification) | |
| Inefficient Regular Expression Complexity | |
| Inefficient Regular Expression Complexity | |
| Link Following | |
| Uncaught Exception | <1:20.20.0-1.module+el8.10.0+23905+c49b2aec |
| Allocation of Resources Without Limits or Throttling | |
| Improper Preservation of Permissions | <1:20.20.0-1.module+el8.10.0+23905+c49b2aec |
| Exposure of System Data to an Unauthorized Control Sphere | <1:20.20.0-1.module+el8.10.0+23905+c49b2aec |
| Allocation of Resources Without Limits or Throttling | <1:20.20.0-1.module+el8.10.0+23905+c49b2aec |
| Improper Preservation of Permissions | <1:20.20.0-1.module+el8.10.0+23905+c49b2aec |
| Uncaught Exception | <1:20.20.0-1.module+el8.10.0+23905+c49b2aec |
| Directory Traversal | |
| Time-of-check Time-of-use (TOCTOU) | |
| Time-of-check Time-of-use (TOCTOU) | |
| Use After Free | |
| OS Command Injection | |
| Inefficient Regular Expression Complexity | |
| HTTP Request Smuggling | <1:20.19.2-1.module+el8.10.0+23139+21ba74c5 |
| Uncaught Exception | <1:20.19.2-1.module+el8.10.0+23139+21ba74c5 |
| Memory Leak | <1:20.19.2-1.module+el8.10.0+23139+21ba74c5 |
| Use After Free | <1:20.19.1-1.module+el8.10.0+23054+5431297f |
| Use of Insufficiently Random Values | <1:20.18.2-1.module+el8.10.0+22767+a3309b10 |
| Incorrect Authorization | <1:20.18.2-1.module+el8.10.0+22767+a3309b10 |
| Resource Exhaustion | <1:20.18.2-1.module+el8.10.0+22767+a3309b10 |
| Inefficient Regular Expression Complexity | |
| Incorrect Permission Assignment for Critical Resource | <1:20.16.0-1.module+el8.10.0+22203+a88c8310 |
| CVE-2024-22018 | <1:20.16.0-1.module+el8.10.0+22203+a88c8310 |
| CVE-2024-22020 | <1:20.16.0-1.module+el8.10.0+22203+a88c8310 |
| Resource Exhaustion | <1:20.16.0-1.module+el8.10.0+22203+a88c8310 |
| HTTP Request Smuggling | <1:20.12.2-2.module+el8.9.0+21743+0b3f1be2 |
| Detection of Error Condition Without Action | <1:20.12.2-2.module+el8.9.0+21743+0b3f1be2 |
| Resource Exhaustion | <1:20.12.2-2.module+el8.9.0+21743+0b3f1be2 |
| Resource Exhaustion | <1:20.12.2-2.module+el8.9.0+21743+0b3f1be2 |
| Improper Privilege Management | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Directory Traversal | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Directory Traversal | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Buffer Under-read | <1:20.12.2-2.module+el8.9.0+21743+0b3f1be2 |
| Incomplete Documentation | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Resource Exhaustion | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Arbitrary Code Injection | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Covert Timing Channel | <1:20.11.1-1.module+el8.9.0+21380+12032667 |
| Information Exposure | <1:20.8.1-1.module+el8.9.0+20473+c4e3d824 |
| Directory Traversal | <1:20.8.1-1.module+el8.9.0+20473+c4e3d824 |
| Improper Validation of Integrity Check Value | <1:20.8.1-1.module+el8.9.0+20473+c4e3d824 |
| Arbitrary Code Injection | <1:20.8.1-1.module+el8.9.0+20473+c4e3d824 |
| Directory Traversal | <1:20.8.1-1.module+el8.9.0+20473+c4e3d824 |
| Resource Exhaustion | <1:20.8.1-1.module+el8.9.0+20473+c4e3d824 |