6.2.11.Final
6 years ago
1 months ago
Known vulnerabilities in the org.jboss.resteasy:resteasy-core package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
org.jboss.resteasy:resteasy-core is a JBoss.org project aimed at providing productivity frameworks for developing client and server RESTful applications and services in Java. Affected versions of this package are vulnerable to Creation of Temporary File With Insecure Permissions such that the insecure How to fix Creation of Temporary File With Insecure Permissions? Upgrade | [0,4.7.8.Final) |
org.jboss.resteasy:resteasy-core is a JBoss.org project aimed at providing productivity frameworks for developing client and server RESTful applications and services in Java. Affected versions of this package are vulnerable to Cross-site Scripting (XSS). Does not properly handle URL encoding when calling How to fix Cross-site Scripting (XSS)? Upgrade | [,4.6.0.Final) |
org.jboss.resteasy:resteasy-core is a JBoss.org project aimed at providing productivity frameworks for developing client and server RESTful applications and services in Java. Affected versions of this package are vulnerable to Denial of Service (DoS). A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service. How to fix Denial of Service (DoS)? Upgrade | [,4.5.6.Final) |
org.jboss.resteasy:resteasy-core is a JBoss.org project aimed at providing productivity frameworks for developing client and server RESTful applications and services in Java. Affected versions of this package are vulnerable to Information Exposure. The endpoint class and method names are returned as part of the exception response when How to fix Information Exposure? Upgrade | [4.6.0,4.6.1)[4.0.0,4.5.10)[3.0.0,3.16.0) |