Search for packages
| purl | pkg:maven/org.jboss.resteasy/resteasy-client@3.0.12.Final |
| Next non-vulnerable version | 3.14.0.Final |
| Latest non-vulnerable version | 4.7.0.Final |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-17rd-f1mq-kfgr
Aliases: CVE-2016-6345 GHSA-vxhj-3x7p-jxp5 |
Exposure of Sensitive Information to an Unauthorized Actor RESTEasy allows remote authenticated users to obtain sensitive information by leveraging "insufficient use of random values" in async jobs. |
Affected by 4 other vulnerabilities. Affected by 4 other vulnerabilities. |
|
VCID-2thz-p7bw-7bdk
Aliases: CVE-2021-20289 GHSA-244r-fcj3-ghjq |
Exposure of class information in RESTEasy A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. |
Affected by 2 other vulnerabilities. Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 0 other vulnerabilities. |
|
VCID-54ek-p545-k3fj
Aliases: CVE-2020-25633 GHSA-hr32-mgpm-qf2f |
Generation of Error Message Containing Sensitive Information in RESTEasy client A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. |
|
VCID-aedf-8vvz-37cp
Aliases: CVE-2020-1695 GHSA-63cq-ppq8-cw6g |
Improper Input Validation in RESTEasy A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed. |
Affected by 0 other vulnerabilities. Affected by 1 other vulnerability. Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
|
VCID-jms5-sctw-mkc5
Aliases: CVE-2016-6347 GHSA-r346-rmrg-qpgh |
Cross-site Scripting Cross-site scripting (XSS) vulnerability in the default exception handler in RESTEasy allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
Affected by 4 other vulnerabilities. Affected by 4 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| This package is not known to fix vulnerabilities. | ||