Search for packages
| purl | pkg:deb/debian/resteasy3.0@3.0.26-1?distro=trixie |
| Vulnerability | Summary | Fixed by |
|---|---|---|
| This package is not known to be affected by vulnerabilities. | ||
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-17rd-f1mq-kfgr | Exposure of Sensitive Information to an Unauthorized Actor RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs. |
CVE-2016-6345
GHSA-vxhj-3x7p-jxp5 |
| VCID-6qhb-4jya-hffz | Inconsistent Interpretation of HTTP Requests in Red Hat JBoss EAP Red Hat JBoss EAP version 3.0.7.Final until 3.0.25.Final, 3.5.0.CR1, and 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact. |
CVE-2017-7561
GHSA-57q5-x8jf-g7h8 |
| VCID-7uh1-a5ng-rqch | JacksonJsonpInterceptor susceptible to cross-site script inclusion (XSSI) attack JacksonJsonpInterceptor in RESTEasy might allow remote attackers to conduct a cross-site script inclusion (XSSI) attack. |
CVE-2016-6348
GHSA-9xfc-j5mf-9w5p |
| VCID-jms5-sctw-mkc5 | Cross-site Scripting Cross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
CVE-2016-6347
GHSA-r346-rmrg-qpgh |
| VCID-p3uc-ee2b-fff5 | Improper Input Validation JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions. |
CVE-2016-9606
GHSA-hgjr-xwj3-jfvw |
| VCID-wbgc-tuj3-47by | Uncontrolled Resource Consumption RESTEasy enables `GZIPInterceptor`, which allows remote attackers to cause a denial of service via unspecified vectors. |
CVE-2016-6346
GHSA-wxvr-vqfp-9cqw |