Search for packages
| purl | pkg:maven/org.jboss.resteasy/resteasy-bom@4.5.6.Final |
| Next non-vulnerable version | 4.6.1.Alpha1 |
| Latest non-vulnerable version | 4.6.1.Alpha1 |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-dww4-f31f-h7az
Aliases: CVE-2021-20293 GHSA-5h26-c766-g93v |
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-6265-k551-gyfv | Uncontrolled Resource Consumption A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. |
CVE-2020-14326
GHSA-37g7-8vjj-pjpj |