CVE-2019-0233
- EPSS 7.78%
- Published 14.09.2020 17:15:09
- Last modified 21.11.2024 04:16:33
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload.
CVE-2015-2992
- EPSS 1.05%
- Published 27.02.2020 18:15:11
- Last modified 21.11.2024 02:28:27
Apache Struts before 2.3.20 has a cross-site scripting (XSS) vulnerability.
CVE-2012-1592
- EPSS 0.81%
- Published 05.12.2019 21:15:11
- Last modified 21.11.2024 01:37:16
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files.
CVE-2011-3923
- EPSS 90.65%
- Published 01.11.2019 14:15:10
- Last modified 21.11.2024 01:31:32
Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
CVE-2018-11776
- EPSS 94.43%
- Published 22.08.2018 13:29:00
- Last modified 13.03.2025 21:01:25
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time...
CVE-2018-1327
- EPSS 3.36%
- Published 27.03.2018 21:29:00
- Last modified 21.11.2024 03:59:38
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson...
CVE-2017-15707
- EPSS 2.48%
- Published 01.12.2017 16:29:00
- Last modified 20.04.2025 01:37:25
In Apache Struts 2.5 to 2.5.14, the REST Plugin is using an outdated JSON-lib library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted JSON payload.
CVE-2016-3090
- EPSS 2.86%
- Published 30.10.2017 14:29:00
- Last modified 20.04.2025 01:37:25
The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling.
- EPSS 2.63%
- Published 16.10.2017 16:29:00
- Last modified 20.04.2025 01:37:25
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785.
CVE-2015-5169
- EPSS 1.15%
- Published 25.09.2017 21:29:00
- Last modified 20.04.2025 01:37:25
Cross-site scripting (XSS) vulnerability in Apache Struts before 2.3.20.