Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat resteasy vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2011-5245
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy prior to 2.3.2 allows remote malicious users to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a ...
Redhat Resteasy 2.1.0
Redhat Resteasy 2.2.0
Redhat Resteasy 2.0.0
Redhat Resteasy 1.2
Redhat Resteasy 1.1
Redhat Resteasy 2.2.2
Redhat Resteasy 1.0.2
Redhat Resteasy 1.0.1
Redhat Resteasy 1.0.0
Redhat Resteasy 2.2.3
Redhat Resteasy 2.0.1
Redhat Resteasy 2.2.1
Redhat Resteasy
Redhat Resteasy 2.3.0
NA
CVE-2012-0818
RESTEasy prior to 2.3.1 allows remote malicious users to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Redhat Resteasy
Redhat Resteasy 2.1.0
Redhat Resteasy 2.2.0
Redhat Resteasy 2.0.0
Redhat Resteasy 1.2
Redhat Resteasy 1.1
Redhat Resteasy 2.2.2
Redhat Resteasy 1.0.2
Redhat Resteasy 1.0.1
Redhat Resteasy 1.0.0
Redhat Resteasy 2.2.3
Redhat Resteasy 2.0.1
Redhat Resteasy 2.2.1
8.1
CVSSv3
CVE-2018-1051
It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.
Redhat Resteasy 3.1.2
Redhat Resteasy 3.0.22
4.3
CVSSv3
CVE-2020-25724
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an malicious user to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Al...
Redhat Resteasy 2.0.0
Redhat Resteasy
Quarkus Quarkus
NA
CVE-2014-3490
RESTEasy 2.3.1 prior to 2.3.8.SP2 and 3.x prior to 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote malicious users to...
Redhat Resteasy 3.0
Redhat Jboss Enterprise Application Platform 6.3.0
Redhat Resteasy
5.5
CVSSv3
CVE-2023-0482
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
Redhat Resteasy
8.1
CVSSv3
CVE-2016-9606
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an malicious user to execute arbitrary code with RESTEasy application permissions.
Redhat Resteasy
5.3
CVSSv3
CVE-2020-25633
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulne...
Redhat Resteasy
Quarkus Quarkus
6.1
CVSSv3
CVE-2021-20293
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an malicious user to launch a refle...
Redhat Resteasy
Netapp Oncommand Insight -
7.5
CVSSv3
CVE-2020-14326
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an malicious user to cause a denial of service.
Redhat Integration Camel K -
Redhat Resteasy
Netapp Oncommand Insight -
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
NEXT »