Red Hat Resteasy Vulnerabilities