Total vulnerabilities in the database
RESTEasy before 2.3.1 allows remote attackers to read arbitrary files via an external entity reference in a DOM document, aka an XML external entity (XXE) injection attack.
Software | From | Fixed in |
---|---|---|
redhat / resteasy | - | 2.3.0.x |
redhat / resteasy | 2.1.0 | 2.1.0.x |
redhat / resteasy | 2.2.0 | 2.2.0.x |
redhat / resteasy | 2.0.0 | 2.0.0.x |
redhat / resteasy | 1.2 | 1.2.x |
redhat / resteasy | 1.1 | 1.1.x |
redhat / resteasy | 2.2.2 | 2.2.2.x |
redhat / resteasy | 1.0.2 | 1.0.2.x |
redhat / resteasy | 1.0.1 | 1.0.1.x |
redhat / resteasy | 1.0.0 | 1.0.0.x |
redhat / resteasy | 2.2.3 | 2.2.3.x |
redhat / resteasy | 2.0.1 | 2.0.1.x |
redhat / resteasy | 2.2.1 | 2.2.1.x |
![]() |
- | 2.3.1 |