| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| magento/community-edition | composer | = 2.4.7-beta1 | 2.4.7-beta2 |
| magento/community-edition | composer | = 2.4.7 | |
| magento/community-edition | composer | = 2.4.6 | |
| magento/community-edition | composer | = 2.4.5 | |
| magento/community-edition | composer | = 2.4.4 | |
| magento/community-edition | composer | >= 2.4.6-p1, < 2.4.6-p3 | 2.4.6-p3 |
| magento/community-edition | composer | >= 2.4.5-p1, < 2.4.5-p5 | 2.4.5-p5 |
| magento/community-edition | composer | >= 2.4.4-p1, < 2.4.4-p6 | 2.4.4-p6 |
| magento/project-community-edition | composer | <= 2.0.2 |
The provided vulnerability information does not include specific technical details about the implementation flaw, commit diffs, or patch details required to identify exact vulnerable functions. While the CWE-400 indicates a resource consumption issue, the advisory and NVD description only mention the impact and affected versions without revealing code context. Without access to the actual code changes between vulnerable and patched versions (e.g., GitHub commits), it's impossible to determine which specific functions lack proper resource control mechanisms (e.g., rate limiting, input validation, or loop safeguards) with high confidence. The vulnerability likely resides in a request processing component, but insufficient evidence exists to pinpoint exact functions.