Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-1um9-45xa-nbaf
Summary
Unsynchronized Access to Shared Data in a Multithreaded Context in RESTEasy
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Alpha3 are affected.
Aliases
0
alias CVE-2020-25724
1
alias GHSA-9699-gm7f-cmjv
Fixed_packages
0
url pkg:deb/debian/resteasy@0?distro=sid
purl pkg:deb/debian/resteasy@0?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/resteasy@0%3Fdistro=sid
1
url pkg:deb/debian/resteasy@3.6.2-4?distro=sid
purl pkg:deb/debian/resteasy@3.6.2-4?distro=sid
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/resteasy@3.6.2-4%3Fdistro=sid
2
url pkg:deb/debian/resteasy3.0@0?distro=trixie
purl pkg:deb/debian/resteasy3.0@0?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/resteasy3.0@0%3Fdistro=trixie
3
url pkg:deb/debian/resteasy3.0@3.0.26-2?distro=trixie
purl pkg:deb/debian/resteasy3.0@3.0.26-2?distro=trixie
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-qktn-umfn-dkhv
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/resteasy3.0@3.0.26-2%3Fdistro=trixie
4
url pkg:deb/debian/resteasy3.0@3.0.26-6?distro=trixie
purl pkg:deb/debian/resteasy3.0@3.0.26-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/resteasy3.0@3.0.26-6%3Fdistro=trixie
5
url pkg:maven/org.jboss.resteasy/resteasy-bom@2.0-beta-2
purl pkg:maven/org.jboss.resteasy/resteasy-bom@2.0-beta-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6265-k551-gyfv
1
vulnerability VCID-dww4-f31f-h7az
2
vulnerability VCID-p3uc-ee2b-fff5
3
vulnerability VCID-qktn-umfn-dkhv
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-bom@2.0-beta-2
6
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0.0.GA
Affected_packages
0
url pkg:maven/org.jboss.resteasy/resteasy-bom@1.2.GA
purl pkg:maven/org.jboss.resteasy/resteasy-bom@1.2.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
1
vulnerability VCID-6265-k551-gyfv
2
vulnerability VCID-dww4-f31f-h7az
3
vulnerability VCID-p3uc-ee2b-fff5
4
vulnerability VCID-qktn-umfn-dkhv
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-bom@1.2.GA
1
url pkg:maven/org.jboss.resteasy/resteasy-bom@1.2.1.GA
purl pkg:maven/org.jboss.resteasy/resteasy-bom@1.2.1.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
1
vulnerability VCID-6265-k551-gyfv
2
vulnerability VCID-dww4-f31f-h7az
3
vulnerability VCID-p3uc-ee2b-fff5
4
vulnerability VCID-qktn-umfn-dkhv
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-bom@1.2.1.GA
2
url pkg:maven/org.jboss.resteasy/resteasy-bom@2.0-beta-1
purl pkg:maven/org.jboss.resteasy/resteasy-bom@2.0-beta-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
1
vulnerability VCID-6265-k551-gyfv
2
vulnerability VCID-dww4-f31f-h7az
3
vulnerability VCID-p3uc-ee2b-fff5
4
vulnerability VCID-qktn-umfn-dkhv
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-bom@2.0-beta-1
3
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0-beta-9
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0-beta-9
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0-beta-9
4
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0-RC1
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0-RC1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0-RC1
5
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.0.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.0.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.0.GA
6
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.1.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.1.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.1.GA
7
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.2.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.2.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.0.2.GA
8
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1-RC1
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1-RC1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1-RC1
9
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1-RC2
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1-RC2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1-RC2
10
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.1.GA
11
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.RC1
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.RC1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.RC1
12
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.GA
13
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.1.GA
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.1.GA
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@1.2.1.GA
14
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-1
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-1
15
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-2
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-2
16
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-3
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-3
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-3
17
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-4
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-4
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-beta-4
18
url pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-RC1
purl pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-RC1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-1um9-45xa-nbaf
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.jboss.resteasy/resteasy-yaml-provider@2.0-RC1
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25724.json
reference_id
reference_type
scores
0
value 4.2
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-25724.json
1
reference_url https://access.redhat.com/security/cve/cve-2020-25724
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://access.redhat.com/security/cve/cve-2020-25724
2
reference_url https://api.first.org/data/v1/epss?cve=CVE-2020-25724
reference_id
reference_type
scores
0
value 0.00132
scoring_system epss
scoring_elements 0.3273
published_at 2026-04-13T12:55:00Z
1
value 0.00132
scoring_system epss
scoring_elements 0.32862
published_at 2026-04-02T12:55:00Z
2
value 0.00132
scoring_system epss
scoring_elements 0.32897
published_at 2026-04-04T12:55:00Z
3
value 0.00132
scoring_system epss
scoring_elements 0.32717
published_at 2026-04-07T12:55:00Z
4
value 0.00132
scoring_system epss
scoring_elements 0.32765
published_at 2026-04-08T12:55:00Z
5
value 0.00132
scoring_system epss
scoring_elements 0.32791
published_at 2026-04-09T12:55:00Z
6
value 0.00132
scoring_system epss
scoring_elements 0.32793
published_at 2026-04-11T12:55:00Z
7
value 0.00132
scoring_system epss
scoring_elements 0.32756
published_at 2026-04-12T12:55:00Z
8
value 0.00132
scoring_system epss
scoring_elements 0.32731
published_at 2026-04-01T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2020-25724
3
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1899354
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://bugzilla.redhat.com/show_bug.cgi?id=1899354
4
reference_url https://nvd.nist.gov/vuln/detail/CVE-2020-25724
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2020-25724
5
reference_url https://security.netapp.com/advisory/ntap-20210702-0003
reference_id
reference_type
scores
0
value 4.3
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
1
value MODERATE
scoring_system generic_textual
scoring_elements
url https://security.netapp.com/advisory/ntap-20210702-0003
6
reference_url https://security.netapp.com/advisory/ntap-20210702-0003/
reference_id
reference_type
scores
url https://security.netapp.com/advisory/ntap-20210702-0003/
7
reference_url https://github.com/advisories/GHSA-9699-gm7f-cmjv
reference_id GHSA-9699-gm7f-cmjv
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-9699-gm7f-cmjv
8
reference_url https://access.redhat.com/errata/RHSA-2021:1004
reference_id RHSA-2021:1004
reference_type
scores
url https://access.redhat.com/errata/RHSA-2021:1004
Weaknesses
0
cwe_id 567
name Unsynchronized Access to Shared Data in a Multithreaded Context
description The product does not properly synchronize shared data, such as static variables across threads, which can lead to undefined behavior and unpredictable data changes.
1
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-1um9-45xa-nbaf