Package Instance
Lookup for vulnerable packages by Package URL.
GET /api/packages/148104?format=api
{ "url": "http://public2.vulnerablecode.io/api/packages/148104?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@2.2-RC-1", "type": "maven", "namespace": "org.jboss.resteasy", "name": "resteasy-jaxrs", "version": "2.2-RC-1", "qualifiers": {}, "subpath": "", "is_vulnerable": true, "next_non_vulnerable_version": "3.14.0.Final", "latest_non_vulnerable_version": "3.15.2.Final", "affected_by_vulnerabilities": [ { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/34640?format=api", "vulnerability_id": "VCID-2thz-p7bw-7bdk", "summary": "Exposure of class information in RESTEasy\nA flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20289.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2021-20289.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20289", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25244", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25191", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25264", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.2534", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.2538", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25157", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25227", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25272", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00088", "scoring_system": "epss", "scoring_elements": "0.25287", "published_at": "2026-04-11T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2021-20289" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1935927" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941544", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1941544" }, { "reference_url": "https://issues.redhat.com/browse/RESTEASY-2843", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.redhat.com/browse/RESTEASY-2843" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2021-20289" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210528-0008", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210528-0008" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210528-0008/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210528-0008/" }, { "reference_url": "https://www.oracle.com/security-alerts/cpuapr2022.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://www.oracle.com/security-alerts/cpuapr2022.html" }, { "reference_url": "https://github.com/advisories/GHSA-244r-fcj3-ghjq", "reference_id": "GHSA-244r-fcj3-ghjq", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-244r-fcj3-ghjq" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3700", "reference_id": "RHSA-2021:3700", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3700" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:3880", "reference_id": "RHSA-2021:3880", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:3880" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4100", "reference_id": "RHSA-2021:4100", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4100" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4676", "reference_id": "RHSA-2021:4676", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4676" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4677", "reference_id": "RHSA-2021:4677", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4677" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4679", "reference_id": "RHSA-2021:4679", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4679" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:4767", "reference_id": "RHSA-2021:4767", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:4767" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5149", "reference_id": "RHSA-2021:5149", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5149" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5150", "reference_id": "RHSA-2021:5150", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5150" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5151", "reference_id": "RHSA-2021:5151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5154", "reference_id": "RHSA-2021:5154", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5154" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:5170", "reference_id": "RHSA-2021:5170", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:5170" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0146", "reference_id": "RHSA-2022:0146", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0146" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0151", "reference_id": "RHSA-2022:0151", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0151" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0152", "reference_id": "RHSA-2022:0152", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0152" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0155", "reference_id": "RHSA-2022:0155", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0155" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:0164", "reference_id": "RHSA-2022:0164", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:0164" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:1179", "reference_id": "RHSA-2022:1179", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:1179" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2022:6407", "reference_id": "RHSA-2022:6407", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2022:6407" }, { "reference_url": "https://usn.ubuntu.com/7351-1/", "reference_id": "USN-7351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7351-1/" }, { "reference_url": "https://usn.ubuntu.com/7630-1/", "reference_id": "USN-7630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7630-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/214928?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.11.5.Final", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-54ek-p545-k3fj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.11.5.Final" }, { "url": "http://public2.vulnerablecode.io/api/packages/237281?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.15.2.Final", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.15.2.Final" }, { "url": "http://public2.vulnerablecode.io/api/packages/569436?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@4.5.10.Final", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@4.5.10.Final" }, { "url": "http://public2.vulnerablecode.io/api/packages/569437?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@4.7.0.Final", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@4.7.0.Final" } ], "aliases": [ "CVE-2021-20289", "GHSA-244r-fcj3-ghjq" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-2thz-p7bw-7bdk" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44990?format=api", "vulnerability_id": "VCID-54ek-p545-k3fj", "summary": "Generation of Error Message Containing Sensitive Information in RESTEasy client\nA flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25633.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25633.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25633", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45554", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45458", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45533", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45555", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45502", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45556", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45557", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45578", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00228", "scoring_system": "epss", "scoring_elements": "0.45548", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-25633" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25633", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25633" }, { "reference_url": "https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0" }, { "reference_url": "https://issues.redhat.com/browse/RESTEASY-2820", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.redhat.com/browse/RESTEASY-2820" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25633", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.3", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-25633" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014983", "reference_id": "1014983", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014983" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879042", "reference_id": "1879042", "reference_type": "", "scores": [], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1879042" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970585", "reference_id": "970585", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970585" }, { "reference_url": "https://github.com/advisories/GHSA-hr32-mgpm-qf2f", "reference_id": "GHSA-hr32-mgpm-qf2f", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-hr32-mgpm-qf2f" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0246", "reference_id": "RHSA-2021:0246", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0246" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0247", "reference_id": "RHSA-2021:0247", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0247" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0248", "reference_id": "RHSA-2021:0248", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0248" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0250", "reference_id": "RHSA-2021:0250", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0250" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0295", "reference_id": "RHSA-2021:0295", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0295" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:0327", "reference_id": "RHSA-2021:0327", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:0327" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1004", "reference_id": "RHSA-2021:1004", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1004" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:1313", "reference_id": "RHSA-2021:1313", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:1313" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2021:2858", "reference_id": "RHSA-2021:2858", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2021:2858" }, { "reference_url": "https://usn.ubuntu.com/7351-1/", "reference_id": "USN-7351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7351-1/" }, { "reference_url": "https://usn.ubuntu.com/7630-1/", "reference_id": "USN-7630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7630-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/214934?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final" } ], "aliases": [ "CVE-2020-25633", "GHSA-hr32-mgpm-qf2f" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-54ek-p545-k3fj" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/6753?format=api", "vulnerability_id": "VCID-hqb2-4hwy-mkg6", "summary": "Information Exposure\nRESTEasy allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.", "references": [ { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0441.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-0519.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1056.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1057.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1058.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1059.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2012-1125.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0371.html" }, { "reference_url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://rhn.redhat.com/errata/RHSA-2014-0372.html" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0421", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:0421" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0441", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:0441" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:0519", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:0519" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1056", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:1056" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1057", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:1057" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1058", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:1058" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1059", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:1059" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2012:1125", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2012:1125" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2013:1263", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2013:1263" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0371", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2014:0371" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2014:0372", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/errata/RHSA-2014:0372" }, { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0818.json", "reference_id": "", "reference_type": "", "scores": [], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2012-0818.json" }, { "reference_url": "https://access.redhat.com/security/cve/CVE-2012-0818", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://access.redhat.com/security/cve/CVE-2012-0818" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0818", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80249", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80197", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80205", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80224", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80213", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80242", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80252", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.8027", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.01376", "scoring_system": "epss", "scoring_elements": "0.80255", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2012-0818" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=785631" }, { "reference_url": "http://secunia.com/advisories/47818", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/47818" }, { "reference_url": "http://secunia.com/advisories/47832", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/47832" }, { "reference_url": "http://secunia.com/advisories/48697", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48697" }, { "reference_url": "http://secunia.com/advisories/48954", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/48954" }, { "reference_url": "http://secunia.com/advisories/50084", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/50084" }, { "reference_url": "http://secunia.com/advisories/57716", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/57716" }, { "reference_url": "http://secunia.com/advisories/57719", "reference_id": "", "reference_type": "", "scores": [], "url": "http://secunia.com/advisories/57719" }, { "reference_url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/72808" }, { "reference_url": "https://github.com/resteasy/Resteasy", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/resteasy/Resteasy" }, { "reference_url": "https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/resteasy/resteasy/commit/71ace879cf92d323bfa4d3e88db0c3059109bbf6" }, { "reference_url": "https://issues.jboss.org/browse/RESTEASY-637", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.jboss.org/browse/RESTEASY-637" }, { "reference_url": "https://issues.jboss.org/browse/RESTEASY-647", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.jboss.org/browse/RESTEASY-647" }, { "reference_url": "https://issues.jboss.org/browse/RESTEASY-659", "reference_id": "", "reference_type": "", "scores": [], "url": "https://issues.jboss.org/browse/RESTEASY-659" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.0", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2012-0818" }, { "reference_url": "https://web.archive.org/web/20200229044434/http://www.securityfocus.com/bid/51748", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20200229044434/http://www.securityfocus.com/bid/51748" }, { "reference_url": "https://web.archive.org/web/20200229045254/https://www.securityfocus.com/bid/51766", "reference_id": "", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://web.archive.org/web/20200229045254/https://www.securityfocus.com/bid/51766" }, { "reference_url": "https://web.archive.org/web/20200229045254/https://www.securityfocus.com/bid/51766/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://web.archive.org/web/20200229045254/https://www.securityfocus.com/bid/51766/" }, { "reference_url": "http://www.osvdb.org/78679", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.osvdb.org/78679" }, { "reference_url": "http://www.securityfocus.com/bid/51748", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/51748" }, { "reference_url": "http://www.securityfocus.com/bid/51766", "reference_id": "", "reference_type": "", "scores": [], "url": "http://www.securityfocus.com/bid/51766" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:*:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.0.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:1.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.0.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.0.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.1.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.0:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.1:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.2:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:2.2.3:*:*:*:*:*:*:*" }, { "reference_url": "https://github.com/advisories/GHSA-wrrh-g7h3-gqmx", "reference_id": "GHSA-wrrh-g7h3-gqmx", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-wrrh-g7h3-gqmx" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/148112?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@2.3.1.GA", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2thz-p7bw-7bdk" }, { "vulnerability": "VCID-54ek-p545-k3fj" }, { "vulnerability": "VCID-jms5-sctw-mkc5" }, { "vulnerability": "VCID-qktn-umfn-dkhv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@2.3.1.GA" }, { "url": "http://public2.vulnerablecode.io/api/packages/20126?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@2.3.1", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@2.3.1" } ], "aliases": [ "CVE-2012-0818", "GHSA-wrrh-g7h3-gqmx" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-hqb2-4hwy-mkg6" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/7889?format=api", "vulnerability_id": "VCID-jms5-sctw-mkc5", "summary": "Cross-site Scripting\nCross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6347.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-6347.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6347", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26063", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26043", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26159", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26234", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26274", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.2611", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26122", "published_at": "2026-04-12T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26168", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00093", "scoring_system": "epss", "scoring_elements": "0.26153", "published_at": "2026-04-01T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2016-6347" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372124", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1372124" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6347", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6347" }, { "reference_url": "http://www.securityfocus.com/bid/92759", "reference_id": "", "reference_type": "", "scores": [ { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "http://www.securityfocus.com/bid/92759" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837170", "reference_id": "837170", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=837170" }, { "reference_url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:-:*:*:*:*:*:*:*", "reference_id": "cpe:2.3:a:redhat:resteasy:-:*:*:*:*:*:*:*", "reference_type": "", "scores": [], "url": "https://nvd.nist.gov/vuln/search/results?adv_search=true&isCpeNameSearch=true&query=cpe:2.3:a:redhat:resteasy:-:*:*:*:*:*:*:*" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6347", "reference_id": "CVE-2016-6347", "reference_type": "", "scores": [ { "value": "4.3", "scoring_system": "cvssv2", "scoring_elements": "AV:N/AC:M/Au:N/C:N/I:P/A:N" }, { "value": "6.1", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "6.1", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2016-6347" }, { "reference_url": "https://github.com/advisories/GHSA-r346-rmrg-qpgh", "reference_id": "GHSA-r346-rmrg-qpgh", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-r346-rmrg-qpgh" }, { "reference_url": "https://usn.ubuntu.com/7630-1/", "reference_id": "USN-7630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7630-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/24103?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.1.0.Final", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2thz-p7bw-7bdk" }, { "vulnerability": "VCID-54ek-p545-k3fj" }, { "vulnerability": "VCID-qktn-umfn-dkhv" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.1.0.Final" } ], "aliases": [ "CVE-2016-6347", "GHSA-r346-rmrg-qpgh" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-jms5-sctw-mkc5" }, { "url": "http://public2.vulnerablecode.io/api/vulnerabilities/44821?format=api", "vulnerability_id": "VCID-qktn-umfn-dkhv", "summary": "Cross-site scripting in RESTEasy\nA cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflected XSS attack.", "references": [ { "reference_url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10688.json", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" } ], "url": "https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-10688.json" }, { "reference_url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10688", "reference_id": "", "reference_type": "", "scores": [ { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.4483", "published_at": "2026-04-13T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44745", "published_at": "2026-04-01T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44825", "published_at": "2026-04-02T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44846", "published_at": "2026-04-04T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44787", "published_at": "2026-04-07T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.4484", "published_at": "2026-04-08T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44842", "published_at": "2026-04-09T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44859", "published_at": "2026-04-11T12:55:00Z" }, { "value": "0.00222", "scoring_system": "epss", "scoring_elements": "0.44828", "published_at": "2026-04-12T12:55:00Z" } ], "url": "https://api.first.org/data/v1/epss?cve=CVE-2020-10688" }, { "reference_url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1814974" }, { "reference_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10688", "reference_id": "", "reference_type": "", "scores": [], "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-10688" }, { "reference_url": "https://github.com/quarkusio/quarkus/issues/7248", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://github.com/quarkusio/quarkus/issues/7248" }, { "reference_url": "https://issues.redhat.com/browse/RESTEASY-2519", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://issues.redhat.com/browse/RESTEASY-2519" }, { "reference_url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10688", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://nvd.nist.gov/vuln/detail/CVE-2020-10688" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210706-0008", "reference_id": "", "reference_type": "", "scores": [ { "value": "5.4", "scoring_system": "cvssv3.1", "scoring_elements": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N" }, { "value": "MODERATE", "scoring_system": "generic_textual", "scoring_elements": "" } ], "url": "https://security.netapp.com/advisory/ntap-20210706-0008" }, { "reference_url": "https://security.netapp.com/advisory/ntap-20210706-0008/", "reference_id": "", "reference_type": "", "scores": [], "url": "https://security.netapp.com/advisory/ntap-20210706-0008/" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015001", "reference_id": "1015001", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1015001" }, { "reference_url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970328", "reference_id": "970328", "reference_type": "", "scores": [], "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970328" }, { "reference_url": "https://github.com/advisories/GHSA-29qj-rvv6-qrmv", "reference_id": "GHSA-29qj-rvv6-qrmv", "reference_type": "", "scores": [ { "value": "MODERATE", "scoring_system": "cvssv3.1_qr", "scoring_elements": "" } ], "url": "https://github.com/advisories/GHSA-29qj-rvv6-qrmv" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2333", "reference_id": "RHSA-2020:2333", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2333" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2511", "reference_id": "RHSA-2020:2511", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2511" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2512", "reference_id": "RHSA-2020:2512", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2512" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2513", "reference_id": "RHSA-2020:2513", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2513" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2515", "reference_id": "RHSA-2020:2515", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2515" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:2905", "reference_id": "RHSA-2020:2905", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:2905" }, { "reference_url": "https://access.redhat.com/errata/RHSA-2020:3806", "reference_id": "RHSA-2020:3806", "reference_type": "", "scores": [], "url": "https://access.redhat.com/errata/RHSA-2020:3806" }, { "reference_url": "https://usn.ubuntu.com/7351-1/", "reference_id": "USN-7351-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7351-1/" }, { "reference_url": "https://usn.ubuntu.com/7630-1/", "reference_id": "USN-7630-1", "reference_type": "", "scores": [], "url": "https://usn.ubuntu.com/7630-1/" } ], "fixed_packages": [ { "url": "http://public2.vulnerablecode.io/api/packages/214924?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.11.1.Final", "is_vulnerable": true, "affected_by_vulnerabilities": [ { "vulnerability": "VCID-2thz-p7bw-7bdk" }, { "vulnerability": "VCID-54ek-p545-k3fj" } ], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.11.1.Final" }, { "url": "http://public2.vulnerablecode.io/api/packages/569606?format=api", "purl": "pkg:maven/org.jboss.resteasy/resteasy-jaxrs@4.5.3", "is_vulnerable": false, "affected_by_vulnerabilities": [], "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@4.5.3" } ], "aliases": [ "CVE-2020-10688", "GHSA-29qj-rvv6-qrmv" ], "risk_score": 3.1, "exploitability": "0.5", "weighted_severity": "6.2", "resource_url": "http://public2.vulnerablecode.io/vulnerabilities/VCID-qktn-umfn-dkhv" } ], "fixing_vulnerabilities": [], "risk_score": "3.1", "resource_url": "http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@2.2-RC-1" }