Incomplete fix for YAML unmarshalling in Resteas
Reporter | Title | Published | Views | Family All 53 |
---|---|---|---|---|
Debian CVE | CVE-2018-1051 | 25 Jan 201820:29 | – | debiancve |
Debian CVE | CVE-2016-9606 | 9 Mar 201820:29 | – | debiancve |
Veracode | Remote Code Execution (RCE) | 26 Jan 201800:15 | – | veracode |
Veracode | Remote Code Execution (RCE) | 15 Jan 201909:16 | – | veracode |
Veracode | Remote Code Execution (RCE) | 16 Dec 201608:05 | – | veracode |
OSV | Deserialization of Untrusted Data in org.jboss.resteasy:resteasy-yaml-provider | 13 May 202201:33 | – | osv |
OSV | CVE-2018-1051 | 25 Jan 201820:29 | – | osv |
OSV | Red Hat Security Advisory: Red Hat JBoss Enterprise Application Platform 6.4.15 update on RHEL 5 | 29 Sep 202417:08 | – | osv |
OSV | CVE-2016-9606 | 9 Mar 201820:29 | – | osv |
OSV | JBoss RESTEasy vulnerable to Improper Input Validation | 14 May 202202:37 | – | osv |
[
{
"product": "resteasy",
"vendor": "Red Hat, Inc.",
"versions": [
{
"status": "affected",
"version": "after 3.0.22"
},
{
"status": "affected",
"version": "after 3.1.2"
}
]
}
]
Source | Link |
---|---|
bugzilla | www.bugzilla.redhat.com/show_bug.cgi |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo