Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:deb/debian/resteasy@3.6.2-4?distro=sid
purl pkg:deb/debian/resteasy@3.6.2-4?distro=sid
Vulnerabilities affecting this package (0)
Vulnerability Summary Fixed by
This package is not known to be affected by vulnerabilities.
Vulnerabilities fixed by this package (11)
Vulnerability Summary Aliases
VCID-17rd-f1mq-kfgr Exposure of Sensitive Information to an Unauthorized Actor RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs. CVE-2016-6345
GHSA-vxhj-3x7p-jxp5
VCID-1um9-45xa-nbaf Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected. CVE-2020-25724
GHSA-9699-gm7f-cmjv
VCID-6265-k551-gyfv Uncontrolled Resource Consumption A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. CVE-2020-14326
GHSA-37g7-8vjj-pjpj
VCID-6qhb-4jya-hffz Inconsistent Interpretation of HTTP Requests in Red Hat JBoss EAP Red Hat JBoss EAP version 3.0.7.Final until 3.0.25.Final, 3.5.0.CR1, and 4.0.0.Beta1 is vulnerable to a server-side cache poisoning or CORS requests in the JAX-RS component resulting in a moderate impact. CVE-2017-7561
GHSA-57q5-x8jf-g7h8
VCID-7uh1-a5ng-rqch JacksonJsonpInterceptor susceptible to cross-site script inclusion (XSSI) attack JacksonJsonpInterceptor in RESTEasy might allow remote attackers to conduct a cross-site script inclusion (XSSI) attack. CVE-2016-6348
GHSA-9xfc-j5mf-9w5p
VCID-jms5-sctw-mkc5 Cross-site Scripting Cross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. CVE-2016-6347
GHSA-r346-rmrg-qpgh
VCID-kg6v-ry5e-2qbh RESTEasy: SerializableProvider enabled by default and deserializes untrusted data CVE-2016-7050
VCID-p3uc-ee2b-fff5 Improper Input Validation JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions. CVE-2016-9606
GHSA-hgjr-xwj3-jfvw
VCID-w6us-ebca-bygb External entities expanded by DocumentProvider `DocumentProvider` in this package does not configure the external-general-entities or external-parameter-entities features, which allows remote attackers to conduct XML external entity (XXE) attacks via unspecified vectors. CVE-2014-7839
GHSA-pc54-pchm-xcw6
VCID-wbgc-tuj3-47by Uncontrolled Resource Consumption RESTEasy enables `GZIPInterceptor`, which allows remote attackers to cause a denial of service via unspecified vectors. CVE-2016-6346
GHSA-wxvr-vqfp-9cqw
VCID-wjgt-y2vt-63gs Deserialization of Untrusted Data Resteasy allows Yaml unmarshalling via `Yaml.load()` in `YamlProvider`. CVE-2018-1051
GHSA-m2fv-3rqm-g7p5

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-16T13:27:38.524413+00:00 Debian Importer Fixing VCID-6265-k551-gyfv https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:33:02.873828+00:00 Debian Importer Fixing VCID-6qhb-4jya-hffz https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T12:01:46.920350+00:00 Debian Importer Fixing VCID-p3uc-ee2b-fff5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:56:16.822450+00:00 Debian Importer Fixing VCID-jms5-sctw-mkc5 https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:46:08.298064+00:00 Debian Importer Fixing VCID-7uh1-a5ng-rqch https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T11:35:38.361408+00:00 Debian Importer Fixing VCID-w6us-ebca-bygb https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:57:31.361149+00:00 Debian Importer Fixing VCID-1um9-45xa-nbaf https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T10:07:17.935066+00:00 Debian Importer Fixing VCID-wjgt-y2vt-63gs https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:47:26.784401+00:00 Debian Importer Fixing VCID-wbgc-tuj3-47by https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:13:44.896493+00:00 Debian Importer Fixing VCID-17rd-f1mq-kfgr https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-16T09:04:56.356480+00:00 Debian Importer Fixing VCID-kg6v-ry5e-2qbh https://security-tracker.debian.org/tracker/data/json 38.4.0
2026-04-13T09:17:18.110844+00:00 Debian Importer Fixing VCID-6265-k551-gyfv https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:35:45.085004+00:00 Debian Importer Fixing VCID-6qhb-4jya-hffz https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:13:02.440923+00:00 Debian Importer Fixing VCID-p3uc-ee2b-fff5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:08:54.593682+00:00 Debian Importer Fixing VCID-jms5-sctw-mkc5 https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T08:01:31.252578+00:00 Debian Importer Fixing VCID-7uh1-a5ng-rqch https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:54:16.988551+00:00 Debian Importer Fixing VCID-w6us-ebca-bygb https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T07:25:57.738422+00:00 Debian Importer Fixing VCID-1um9-45xa-nbaf https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:47:49.055835+00:00 Debian Importer Fixing VCID-wjgt-y2vt-63gs https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-13T06:32:23.440548+00:00 Debian Importer Fixing VCID-wbgc-tuj3-47by https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:10:22.712239+00:00 Debian Importer Fixing VCID-17rd-f1mq-kfgr https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-11T18:05:10.911290+00:00 Debian Importer Fixing VCID-kg6v-ry5e-2qbh https://security-tracker.debian.org/tracker/data/json 38.3.0
2026-04-03T07:52:02.309417+00:00 Debian Importer Fixing VCID-1um9-45xa-nbaf https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.265044+00:00 Debian Importer Fixing VCID-6265-k551-gyfv https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.232200+00:00 Debian Importer Fixing VCID-wjgt-y2vt-63gs https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.209325+00:00 Debian Importer Fixing VCID-6qhb-4jya-hffz https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.183691+00:00 Debian Importer Fixing VCID-p3uc-ee2b-fff5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.159799+00:00 Debian Importer Fixing VCID-kg6v-ry5e-2qbh https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.138072+00:00 Debian Importer Fixing VCID-7uh1-a5ng-rqch https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.114442+00:00 Debian Importer Fixing VCID-jms5-sctw-mkc5 https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.090607+00:00 Debian Importer Fixing VCID-wbgc-tuj3-47by https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.065729+00:00 Debian Importer Fixing VCID-17rd-f1mq-kfgr https://security-tracker.debian.org/tracker/data/json 38.1.0
2026-04-03T07:52:02.040412+00:00 Debian Importer Fixing VCID-w6us-ebca-bygb https://security-tracker.debian.org/tracker/data/json 38.1.0