Логотип exploitDog
bind:CVE-2024-1726
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-1726

Количество 4

Количество 4

redhat логотип

CVE-2024-1726

почти 2 года назад

A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.

CVSS3: 5.3
EPSS: Низкий
nvd логотип

CVE-2024-1726

почти 2 года назад

A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.

CVSS3: 5.3
EPSS: Низкий
github логотип

GHSA-mv64-86g8-cqq7

почти 2 года назад

Quarkus: security checks in resteasy reactive may trigger a denial of service

CVSS3: 5.3
EPSS: Низкий
fstec логотип

BDU:2024-05687

почти 2 года назад

Уязвимость компонента RESTEasy Reactive Java-фреймворка Quarkus, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2024-1726

A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
nvd логотип
CVE-2024-1726

A flaw was discovered in the RESTEasy Reactive implementation in Quarkus. Due to security checks for some JAX-RS endpoints being performed after serialization, more processing resources are consumed while the HTTP request is checked. In certain configurations, if an attacker has knowledge of any POST, PUT, or PATCH request paths, they can potentially identify vulnerable endpoints and trigger excessive resource usage as the endpoints process the requests. This can result in a denial of service.

CVSS3: 5.3
0%
Низкий
почти 2 года назад
github логотип
GHSA-mv64-86g8-cqq7

Quarkus: security checks in resteasy reactive may trigger a denial of service

CVSS3: 5.3
0%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-05687

Уязвимость компонента RESTEasy Reactive Java-фреймворка Quarkus, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 5.3
0%
Низкий
почти 2 года назад

Уязвимостей на страницу