Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
Typemaven
Namespaceorg.jboss.resteasy
Nameresteasy-yaml-provider
Version2.0.0.GA
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version3.1.3.Final
Latest_non_vulnerable_version3.6.0.Final
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-1um9-45xa-nbaf
vulnerability_id VCID-1um9-45xa-nbaf
summary
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25724.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25724.json
1
reference_url https://access.redhat.com/security/cve/cve-2020-25724
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/cve-2020-25724
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25724
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.32765
published_at 2026-04-08T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.3277
published_at 2026-04-16T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32717
published_at 2026-04-07T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32791
published_at 2026-04-09T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.3273
published_at 2026-04-13T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32756
published_at 2026-04-12T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32731
published_at 2026-04-01T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-11T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-02T12:55:00Z
9
value 0.00132
scoring_system epss
scoring_elements 0.32897
published_at 2026-04-04T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25724
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1899354
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1899354
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25724
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25724
5
reference_url https://security.netapp.com/advisory/ntap-20210702-0003
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210702-0003
6
reference_url https://security.netapp.com/advisory/ntap-20210702-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210702-0003/
7
reference_url https://github.com/advisories/GHSA-9699-gm7f-cmjv
reference_id GHSA-9699-gm7f-cmjv
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9699-gm7f-cmjv
8
reference_url https://access.redhat.com/errata/RHSA-2021:1004
reference_id RHSA-2021:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1004
fixed_packages
0
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
aliases CVE-2020-25724, GHSA-9699-gm7f-cmjv
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-1um9-45xa-nbaf
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA