Search for packages
| purl | pkg:maven/org.jboss.resteasy/resteasy-client@3.12.0.Final |
| Next non-vulnerable version | 3.14.0.Final |
| Latest non-vulnerable version | 4.7.0.Final |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-54ek-p545-k3fj
Aliases: CVE-2020-25633 GHSA-hr32-mgpm-qf2f |
Generation of Error Message Containing Sensitive Information in RESTEasy client A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. |
Affected by 0 other vulnerabilities. Affected by 2 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-aedf-8vvz-37cp | Improper Input Validation in RESTEasy A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed. |
CVE-2020-1695
GHSA-63cq-ppq8-cw6g |