CVE-2023-0482
- EPSS 0.04%
- Veröffentlicht 17.02.2023 22:15:11
- Zuletzt bearbeitet 18.03.2025 16:15:15
In RESTEasy the insecure File.createTempFile() is used in the DataSourceProvider, FileProvider and Mime4JWorkaround classes which creates temp files with insecure permissions that could be read by a local user.
CVE-2021-20293
- EPSS 0.4%
- Veröffentlicht 10.06.2021 12:15:07
- Zuletzt bearbeitet 21.11.2024 05:46:17
A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an at...
CVE-2020-14326
- EPSS 0.5%
- Veröffentlicht 02.06.2021 12:15:08
- Zuletzt bearbeitet 21.11.2024 05:03:00
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial...
CVE-2020-10688
- EPSS 0.22%
- Veröffentlicht 27.05.2021 19:15:07
- Zuletzt bearbeitet 21.11.2024 04:55:51
A cross-site scripting (XSS) flaw was found in RESTEasy in versions before 3.11.1.Final and before 4.5.3.Final, where it did not properly handle URL encoding when the RESTEASY003870 exception occurs. An attacker could use this flaw to launch a reflec...
CVE-2020-25724
- EPSS 0.13%
- Veröffentlicht 26.05.2021 21:15:08
- Zuletzt bearbeitet 21.11.2024 05:18:35
A flaw was found in RESTEasy, where an incorrect response to an HTTP request is provided. This flaw allows an attacker to gain access to privileged information. The highest threat from this vulnerability is to confidentiality and integrity. Versions ...
CVE-2021-20289
- EPSS 0.09%
- Veröffentlicht 26.03.2021 17:15:13
- Zuletzt bearbeitet 21.11.2024 05:46:17
A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JA...
CVE-2020-25633
- EPSS 0.28%
- Veröffentlicht 18.09.2020 19:15:16
- Zuletzt bearbeitet 21.11.2024 05:18:17
A flaw was found in RESTEasy client in all versions of RESTEasy up to 4.5.6.Final. It may allow client users to obtain the server's potentially sensitive information when the server got WebApplicationException from the RESTEasy client call. The highe...
CVE-2020-1695
- EPSS 0.75%
- Veröffentlicht 19.05.2020 15:15:11
- Zuletzt bearbeitet 21.11.2024 05:11:11
A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This fla...
CVE-2016-9606
- EPSS 1.36%
- Veröffentlicht 09.03.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:01:30
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.
CVE-2018-1051
- EPSS 0.69%
- Veröffentlicht 25.01.2018 20:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:04
It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.