Search Results (Refine Search)
- Results Type: Overview
- Search Type: Search All
- Category (CWE): CWE-20 Improper Input Validation
- CPE Vendor: cpe:/:apache
- CPE Product: cpe:/:apache:struts
Vuln ID | Summary | CVSS Severity |
---|---|---|
CVE-2016-3082 |
XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter. Published: April 26, 2016; 10:59:03 AM -0400 |
V3.0: 9.8 CRITICAL V2.0: 10.0 HIGH |
CVE-2016-0785 |
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. Published: April 12, 2016; 12:59:00 PM -0400 |
V3.0: 8.8 HIGH V2.0: 9.0 HIGH |
CVE-2014-0114 |
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. Published: April 30, 2014; 6:49:03 AM -0400 |
V3.x:(not available) V2.0: 7.5 HIGH |
CVE-2013-2251 |
Apache Struts 2.0.0 through 2.3.15 allows remote attackers to execute arbitrary OGNL expressions via a parameter with a crafted (1) action:, (2) redirect:, or (3) redirectAction: prefix. Published: July 19, 2013; 11:37:30 PM -0400 |
V3.x:(not available) V2.0: 9.3 HIGH |
CVE-2013-2248 |
Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix. Published: July 19, 2013; 11:37:30 PM -0400 |
V3.x:(not available) V2.0: 5.8 MEDIUM |
CVE-2012-0838 |
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. Published: March 02, 2012; 5:55:01 PM -0500 |
V3.x:(not available) V2.0: 10.0 HIGH |
CVE-2012-0391 |
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. Published: January 08, 2012; 10:55:01 AM -0500 |
V3.x:(not available) V2.0: 9.3 HIGH |
CVE-2008-6504 |
ParametersInterceptor in OpenSymphony XWork 2.0.x before 2.0.6 and 2.1.x before 2.1.2, as used in Apache Struts and other products, does not properly restrict # (pound sign) references to context objects, which allows remote attackers to execute Object-Graph Navigation Language (OGNL) statements and modify server-side context objects, as demonstrated by use of a \u0023 representation for the # character. Published: March 23, 2009; 10:19:12 AM -0400 |
V3.x:(not available) V2.0: 5.0 MEDIUM |