Vulnerabilities (CVE)

Filtered by vendor Redhat Subscribe
Filtered by product Resteasy
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-14326 2 Netapp, Redhat 3 Oncommand Insight, Integration Camel K, Resteasy 2022-07-15 5.0 MEDIUM 7.5 HIGH
A vulnerability was found in RESTEasy, where RootNode incorrectly caches routes. This issue results in hash flooding, leading to slower requests with higher CPU time spent searching and adding the entry. This flaw allows an attacker to cause a denial of service.
CVE-2020-1695 2 Fedoraproject, Redhat 2 Fedora, Resteasy 2022-01-01 5.0 MEDIUM 7.5 HIGH
A flaw was found in all resteasy 3.x.x versions prior to 3.12.0.Final and all resteasy 4.x.x versions prior to 4.6.0.Final, where an improper input validation results in returning an illegal header that integrates into the server's response. This flaw may result in an injection, which leads to unexpected behavior when the HTTP response is constructed.
CVE-2018-1051 1 Redhat 1 Resteasy 2019-10-09 6.8 MEDIUM 8.1 HIGH
It was found that the fix for CVE-2016-9606 in versions 3.0.22 and 3.1.2 was incomplete and Yaml unmarshalling in Resteasy is still possible via `Yaml.load()` in YamlProvider.
CVE-2016-6346 1 Redhat 1 Resteasy 2019-05-14 5.0 MEDIUM 7.5 HIGH
RESTEasy enables GZIPInterceptor, which allows remote attackers to cause a denial of service via unspecified vectors.
CVE-2016-9606 1 Redhat 1 Resteasy 2018-10-12 6.8 MEDIUM 8.1 HIGH
JBoss RESTEasy before version 3.1.2 could be forced into parsing a request with YamlProvider, resulting in unmarshalling of potentially untrusted data which could allow an attacker to execute arbitrary code with RESTEasy application permissions.