Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final
Typemaven
Namespaceorg.jboss.resteasy
Nameresteasy-jaxrs
Version3.14.0.Final
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.15.2.Final
Latest_non_vulnerable_version3.15.2.Final
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-54ek-p545-k3fj
vulnerability_id VCID-54ek-p545-k3fj
summary
Generation of Error Message Containing Sensitive Information in RESTEasy client
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25633.json
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25633.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25633
reference_id
reference_type
scores
0
value 0.00228
scoring_system epss
scoring_elements 0.45602
published_at 2026-04-16T12:55:00Z
1
value 0.00228
scoring_system epss
scoring_elements 0.45554
published_at 2026-04-13T12:55:00Z
2
value 0.00228
scoring_system epss
scoring_elements 0.45548
published_at 2026-04-12T12:55:00Z
3
value 0.00228
scoring_system epss
scoring_elements 0.45555
published_at 2026-04-04T12:55:00Z
4
value 0.00228
scoring_system epss
scoring_elements 0.45533
published_at 2026-04-02T12:55:00Z
5
value 0.00228
scoring_system epss
scoring_elements 0.45502
published_at 2026-04-07T12:55:00Z
6
value 0.00228
scoring_system epss
scoring_elements 0.45578
published_at 2026-04-11T12:55:00Z
7
value 0.00228
scoring_system epss
scoring_elements 0.45557
published_at 2026-04-09T12:55:00Z
8
value 0.00228
scoring_system epss
scoring_elements 0.45458
published_at 2026-04-01T12:55:00Z
9
value 0.00228
scoring_system epss
scoring_elements 0.45556
published_at 2026-04-08T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25633
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25633
3
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25633
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-25633
4
reference_url https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://github.com/resteasy/Resteasy/pull/2665/commits/13c808b5967242eec1e877edbc0014a84dcd6eb0
5
reference_url https://issues.redhat.com/browse/RESTEASY-2820
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://issues.redhat.com/browse/RESTEASY-2820
6
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25633
reference_id
reference_type
scores
0
value 5.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25633
7
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014983
reference_id 1014983
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1014983
8
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1879042
reference_id 1879042
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1879042
9
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970585
reference_id 970585
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=970585
10
reference_url https://github.com/advisories/GHSA-hr32-mgpm-qf2f
reference_id GHSA-hr32-mgpm-qf2f
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-hr32-mgpm-qf2f
11
reference_url https://access.redhat.com/errata/RHSA-2021:0246
reference_id RHSA-2021:0246
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0246
12
reference_url https://access.redhat.com/errata/RHSA-2021:0247
reference_id RHSA-2021:0247
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0247
13
reference_url https://access.redhat.com/errata/RHSA-2021:0248
reference_id RHSA-2021:0248
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0248
14
reference_url https://access.redhat.com/errata/RHSA-2021:0250
reference_id RHSA-2021:0250
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0250
15
reference_url https://access.redhat.com/errata/RHSA-2021:0295
reference_id RHSA-2021:0295
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0295
16
reference_url https://access.redhat.com/errata/RHSA-2021:0327
reference_id RHSA-2021:0327
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:0327
17
reference_url https://access.redhat.com/errata/RHSA-2021:1004
reference_id RHSA-2021:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1004
18
reference_url https://access.redhat.com/errata/RHSA-2021:1313
reference_id RHSA-2021:1313
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1313
19
reference_url https://access.redhat.com/errata/RHSA-2021:2858
reference_id RHSA-2021:2858
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:2858
20
reference_url https://usn.ubuntu.com/7351-1/
reference_id USN-7351-1
reference_type
scores
url https://usn.ubuntu.com/7351-1/
21
reference_url https://usn.ubuntu.com/7630-1/
reference_id USN-7630-1
reference_type
scores
url https://usn.ubuntu.com/7630-1/
fixed_packages
0
url pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final
purl pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final
aliases CVE-2020-25633, GHSA-hr32-mgpm-qf2f
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-54ek-p545-k3fj
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.14.0.Final