Red Hat RESTEasy 4.3.1

CPE Details

Red Hat RESTEasy 4.3.1
4.3.1
2021-01-14
18h35 +00:00
2021-01-14
18h35 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:redhat:resteasy:4.3.1:*:*:*:*:*:*:*

Informations

Vendor

redhat

Product

resteasy

Version

4.3.1

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2021-20293 2021-06-10 09h09 +00:00 A reflected Cross-Site Scripting (XSS) flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final, where it did not properly handle URL encoding when calling @javax.ws.rs.PathParam without any @Produces MediaType. This flaw allows an attacker to launch a reflected XSS attack. The highest threat from this vulnerability is to data confidentiality and integrity.
6.1
Moyen
CVE-2020-14326 2021-06-02 09h23 +00:00 A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.
7.5
Haute
CVE-2021-20289 2021-03-26 15h28 +00:00 A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
5.3
Moyen
CVE-2020-1695 2020-05-19 12h13 +00:00 A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
7.5
Haute