Количество 7
Количество 7

CVE-2021-20289
A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

CVE-2021-20289
A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.

CVE-2021-20289
A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality.
CVE-2021-20289
A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.F ...
GHSA-244r-fcj3-ghjq
Exposure of class information in RESTEasy

BDU:2022-02827
Уязвимость программного средства RESTEasy, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию

ROS-20250807-05
Множественные уязвимости resteasy
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
---|---|---|---|---|
![]() | CVE-2021-20289 A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-20289 A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | CVE-2021-20289 A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.Final. The endpoint class and method names are returned as part of the exception response when RESTEasy cannot convert one of the request URI path or query values to the matching JAX-RS resource method's parameter value. The highest threat from this vulnerability is to data confidentiality. | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
CVE-2021-20289 A flaw was found in RESTEasy in all versions of RESTEasy up to 4.6.0.F ... | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
GHSA-244r-fcj3-ghjq Exposure of class information in RESTEasy | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад | |
![]() | BDU:2022-02827 Уязвимость программного средства RESTEasy, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию | CVSS3: 5.3 | 0% Низкий | больше 4 лет назад |
![]() | ROS-20250807-05 Множественные уязвимости resteasy | CVSS3: 7.5 | 7 дней назад |
Уязвимостей на страницу