Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.jboss.resteasy/resteasy-multipart-provider
  4. ›
  5. GHSA-jrmh-v64j-mjm9

GHSA-jrmh-v64j-mjm9: Duplicate

February 18, 2023 (updated January 26, 2026)

This advisory duplicates another.

References

  • github.com/advisories/GHSA-jrmh-v64j-mjm9
  • github.com/orgs/resteasy/discussions/3415
  • github.com/orgs/resteasy/discussions/3504
  • github.com/orgs/resteasy/discussions/3506
  • github.com/resteasy/Resteasy
  • github.com/resteasy/resteasy/pull/3409/commits/807d7456f2137cde8ef7c316707211bf4e542d56
  • issues.redhat.com/browse/RESTEASY-3286
  • nvd.nist.gov/vuln/detail/CVE-2023-0482
  • security.netapp.com/advisory/ntap-20230427-0001

Code Behaviors & Features

Detect and mitigate GHSA-jrmh-v64j-mjm9 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

None

Solution

N/A

Impact 5.5 MEDIUM

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-378: Creation of Temporary File With Insecure Permissions

Source file

maven/org.jboss.resteasy/resteasy-multipart-provider/GHSA-jrmh-v64j-mjm9.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Thu, 05 Feb 2026 00:18:14 +0000.