Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
redhat resteasy 2.0.0 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2012-0818
RESTEasy prior to 2.3.1 allows remote malicious users to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Redhat Resteasy
Redhat Resteasy 2.1.0
Redhat Resteasy 2.2.0
Redhat Resteasy 2.0.0
Redhat Resteasy 1.2
Redhat Resteasy 1.1
Redhat Resteasy 2.2.2
Redhat Resteasy 1.0.2
Redhat Resteasy 1.0.1
Redhat Resteasy 1.0.0
Redhat Resteasy 2.2.3
Redhat Resteasy 2.0.1
Redhat Resteasy 2.2.1
NA
CVE-2011-5245
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy prior to 2.3.2 allows remote malicious users to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a ...
Redhat Resteasy 2.1.0
Redhat Resteasy 2.2.0
Redhat Resteasy 2.0.0
Redhat Resteasy 1.2
Redhat Resteasy 1.1
Redhat Resteasy 2.2.2
Redhat Resteasy 1.0.2
Redhat Resteasy 1.0.1
Redhat Resteasy 1.0.0
Redhat Resteasy 2.2.3
Redhat Resteasy 2.0.1
Redhat Resteasy 2.2.1
Redhat Resteasy
Redhat Resteasy 2.3.0
4.3
CVSSv3
CVE-2020-25724
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an malicious user to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions before resteasy 2.0.0.Al...
Redhat Resteasy 2.0.0
Redhat Resteasy
Quarkus Quarkus
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started