Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
resteasy vulnerabilities and exploits
(subscribe to this query)
5.3
CVSSv3
CVE-2020-25633
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highest threat from this vulne...
Redhat Resteasy
Quarkus Quarkus
7.5
CVSSv3
CVE-2020-1695
A flaw was found in all resteasy 3.x.x versions before 3.12.0.Final and all resteasy 4.x.x versions before 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection,...
Redhat Resteasy
Fedoraproject Fedora 32
Fedoraproject Fedora 33
1 Github repository
6.5
CVSSv3
CVE-2014-3599
HornetQ REST is vulnerable to XML External Entity due to insecure configuration of RestEasy
Redhat Hornetq
8.1
CVSSv3
CVE-2016-9606
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an malicious user to execute arbitrary code with RESTEasy application permissions.
Redhat Resteasy
8.1
CVSSv3
CVE-2018-1051
It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.
Redhat Resteasy 3.1.2
Redhat Resteasy 3.0.22
NA
CVE-2016-9571
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2016-9606. Reason: This candidate is a duplicate of CVE-2016-9606. Reason: this ID was intended for one issue, but was associated with two issues. Notes: All CVE users should reference CVE-2016-9606 instead of thi...
NA
CVE-2014-3490
RESTEasy 2.3.1 prior to 2.3.8.SP2 and 3.x prior to 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote malicious users to...
Redhat Jboss Enterprise Application Platform 6.3.0
Redhat Resteasy 3.0
Redhat Resteasy
NA
CVE-2012-0818
RESTEasy prior to 2.3.1 allows remote malicious users to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Redhat Resteasy
Redhat Resteasy 2.1.0
Redhat Resteasy 2.2.0
Redhat Resteasy 2.0.0
Redhat Resteasy 1.2
Redhat Resteasy 1.1
Redhat Resteasy 2.2.2
Redhat Resteasy 1.0.2
Redhat Resteasy 1.0.1
Redhat Resteasy 1.0.0
Redhat Resteasy 2.2.3
Redhat Resteasy 2.0.1
Redhat Resteasy 2.2.1
NA
CVE-2011-5245
The readFrom function in providers.jaxb.JAXBXmlTypeProvider in RESTEasy prior to 2.3.2 allows remote malicious users to read arbitrary files via an external entity reference in a Java Architecture for XML Binding (JAXB) input, aka an XML external entity (XXE) injection attack, a ...
Redhat Resteasy 2.0.1
Redhat Resteasy 2.0.0
Redhat Resteasy 2.2.1
Redhat Resteasy 2.2.0
Redhat Resteasy 2.1.0
Redhat Resteasy 1.0.0
Redhat Resteasy 2.2.3
Redhat Resteasy 2.2.2
Redhat Resteasy 1.0.2
Redhat Resteasy 1.0.1
Redhat Resteasy
Redhat Resteasy 2.3.0
Redhat Resteasy 1.2
Redhat Resteasy 1.1
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2