Search for packages
| purl | pkg:maven/org.jboss.resteasy/resteasy-jaxrs@3.11.5.Final |
| Next non-vulnerable version | 3.14.0.Final |
| Latest non-vulnerable version | 3.15.2.Final |
| Risk | 3.1 |
| Vulnerability | Summary | Fixed by |
|---|---|---|
|
VCID-54ek-p545-k3fj
Aliases: CVE-2020-25633 GHSA-hr32-mgpm-qf2f |
Generation of Error Message Containing Sensitive Information in RESTEasy client A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulnerability is to data confidentiality. |
Affected by 0 other vulnerabilities. |
| Vulnerability | Summary | Aliases |
|---|---|---|
| VCID-2thz-p7bw-7bdk | Exposure of class information in RESTEasy A flaw was found in RESTEasy in all current versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. |
CVE-2021-20289
GHSA-244r-fcj3-ghjq |