Search for packages
| purl | pkg:maven/org.jboss.resteasy/resteasy-client@4.5.10.Final |
| Next non-vulnerable version | 4.7.0.Final |
| Latest non-vulnerable version | 4.7.0.Final |
| Risk | 4.0 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-aedf-8vvz-37cp
Aliases: CVE-2020-1695 GHSA-63cq-ppq8-cw6g |
Improper Input Validation in RESTEasy A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed. |
Affected by 1 other vulnerability. Affected by 1 other vulnerability. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2thz-p7bw-7bdk | Exposure of class information in RESTEasy A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. |
CVE-2021-20289
GHSA-244r-fcj3-ghjq |