CVE-2019-0230
- EPSS 93.73%
- Veröffentlicht 14.09.2020 17:15:09
- Zuletzt bearbeitet 21.11.2024 04:16:32
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution.
CVE-2019-0233
- EPSS 9.31%
- Veröffentlicht 14.09.2020 17:15:09
- Zuletzt bearbeitet 21.11.2024 04:16:33
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
CVE-2015-2992
- EPSS 1.05%
- Veröffentlicht 27.02.2020 18:15:11
- Zuletzt bearbeitet 21.11.2024 02:28:27
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
CVE-2012-1592
- EPSS 0.81%
- Veröffentlicht 05.12.2019 21:15:11
- Zuletzt bearbeitet 21.11.2024 01:37:16
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2011-3923
- EPSS 89.73%
- Veröffentlicht 01.11.2019 14:15:10
- Zuletzt bearbeitet 21.11.2024 01:31:32
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
CVE-2018-11776
- EPSS 94.43%
- Veröffentlicht 22.08.2018 13:29:00
- Zuletzt bearbeitet 27.10.2025 17:38:06
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time...
CVE-2018-1327
- EPSS 3.36%
- Veröffentlicht 27.03.2018 21:29:00
- Zuletzt bearbeitet 21.11.2024 03:59:38
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson...
CVE-2017-15707
- EPSS 2.48%
- Veröffentlicht 01.12.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
CVE-2016-3090
- EPSS 2.86%
- Veröffentlicht 30.10.2017 14:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling.
- EPSS 2.63%
- Veröffentlicht 16.10.2017 16:29:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.