Apache

Struts

90 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 88.87%
  • Veröffentlicht 16.12.2020 01:15:12
  • Zuletzt bearbeitet 23.05.2025 16:54:02

XStream is a Java library to serialize objects to XML and back again. In XStream before version 1.4.15, is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling. The vulnerability may allow a remote attacker to delete arbitrar...

Warnung
  • EPSS 94.38%
  • Veröffentlicht 11.12.2020 02:15:10
  • Zuletzt bearbeitet 27.10.2025 17:37:20

Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. Affected software : Apache Struts 2.0.0 - Struts 2.5.25.

  • EPSS 9.31%
  • Veröffentlicht 14.09.2020 17:15:09
  • Zuletzt bearbeitet 21.11.2024 04:16:33

An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.

Exploit
  • EPSS 93.73%
  • Veröffentlicht 14.09.2020 17:15:09
  • Zuletzt bearbeitet 21.11.2024 04:16:32

Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.

  • EPSS 1.6%
  • Veröffentlicht 27.02.2020 18:15:11
  • Zuletzt bearbeitet 21.11.2024 02:28:27

Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.

  • EPSS 0.81%
  • Veröffentlicht 05.12.2019 21:15:11
  • Zuletzt bearbeitet 21.11.2024 01:37:16

A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.

  • EPSS 91.05%
  • Veröffentlicht 01.11.2019 14:15:10
  • Zuletzt bearbeitet 21.11.2024 01:31:32

Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.

Warnung Exploit
  • EPSS 94.43%
  • Veröffentlicht 22.08.2018 13:29:00
  • Zuletzt bearbeitet 27.10.2025 17:38:06

Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time...

  • EPSS 3.7%
  • Veröffentlicht 27.03.2018 21:29:00
  • Zuletzt bearbeitet 21.11.2024 03:59:38

The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson...

  • EPSS 2.48%
  • Veröffentlicht 01.12.2017 16:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.