| 0 |
| url |
VCID-2chz-36wn-9fcv |
| vulnerability_id |
VCID-2chz-36wn-9fcv |
| summary |
Manipulation of Struts internals
This package allows remote attackers to manipulate Struts internals, alter user sessions, or affect container settings via vectors involving a top object. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5209 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80173 |
| published_at |
2026-04-09T12:55:00Z |
|
| 1 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80167 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80138 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80169 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80178 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80192 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80198 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.01362 |
| scoring_system |
epss |
| scoring_elements |
0.80197 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.02387 |
| scoring_system |
epss |
| scoring_elements |
0.84967 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.02387 |
| scoring_system |
epss |
| scoring_elements |
0.84935 |
| published_at |
2026-04-01T12:55:00Z |
|
| 10 |
| value |
0.02387 |
| scoring_system |
epss |
| scoring_elements |
0.84949 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5209 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.24.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.24.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 3 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 4 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 5 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 6 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 7 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 8 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 9 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 10 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 11 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 12 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 13 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 14 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 15 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 16 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 17 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 18 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 19 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 20 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 21 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 22 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 23 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 24 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 25 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 26 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.24.1 |
|
|
| aliases |
CVE-2015-5209, GHSA-4qgj-9mvg-3929
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2chz-36wn-9fcv |
|
| 1 |
| url |
VCID-2rjv-1thm-dugt |
| vulnerability_id |
VCID-2rjv-1thm-dugt |
| summary |
XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3082 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96109 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96146 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96141 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96132 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.9613 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96131 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96095 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96129 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96125 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96103 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.24626 |
| scoring_system |
epss |
| scoring_elements |
0.96115 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3082 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3082 |
| reference_id |
CVE-2016-3082 |
| reference_type |
|
| scores |
| 0 |
| value |
10.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:C/I:C/A:C |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3082 |
|
| 63 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 3 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 4 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 5 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 6 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 7 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 8 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 9 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 10 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 11 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 12 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 13 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 14 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 15 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 16 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 17 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 18 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 19 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 20 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 21 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 22 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 23 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 24 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 1 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 2 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 7 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 8 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 9 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 10 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 11 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 12 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 13 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 14 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 15 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 16 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 17 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 18 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 19 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 20 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 21 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 22 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 23 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
|
| 2 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.28.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.28.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 1 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 2 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 3 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 4 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 5 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 6 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 7 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 8 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 9 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 10 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 11 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 12 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 13 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 14 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 15 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 16 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 17 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 18 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 19 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 20 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 21 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.28.1 |
|
|
| aliases |
CVE-2016-3082, GHSA-pvm9-288c-v5wq
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2rjv-1thm-dugt |
|
| 2 |
| url |
VCID-2v7h-fght-cugn |
| vulnerability_id |
VCID-2v7h-fght-cugn |
| summary |
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7809 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91839 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.9179 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91795 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91804 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91817 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91823 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91826 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91828 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91824 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91845 |
| published_at |
2026-04-16T12:55:00Z |
|
| 10 |
| value |
0.07545 |
| scoring_system |
epss |
| scoring_elements |
0.91781 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-7809 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2014-7809, GHSA-h4v9-jf2r-9h6m
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-2v7h-fght-cugn |
|
| 3 |
| url |
VCID-3yq7-n972-j7dh |
| vulnerability_id |
VCID-3yq7-n972-j7dh |
| summary |
Improperly Controlled Modification of Dynamically-Determined Object Attributes
Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-0230 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93727 |
| scoring_system |
epss |
| scoring_elements |
0.99848 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.93727 |
| scoring_system |
epss |
| scoring_elements |
0.99851 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.93727 |
| scoring_system |
epss |
| scoring_elements |
0.9985 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.93727 |
| scoring_system |
epss |
| scoring_elements |
0.99849 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.93727 |
| scoring_system |
epss |
| scoring_elements |
0.99852 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-0230 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-0230, GHSA-wp4h-pvgw-5727
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-3yq7-n972-j7dh |
|
| 4 |
| url |
VCID-4agy-6nsx-7ufh |
| vulnerability_id |
VCID-4agy-6nsx-7ufh |
| summary |
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3093 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89807 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.8975 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89753 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89768 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.8977 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89787 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89793 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.898 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89798 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89791 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.05068 |
| scoring_system |
epss |
| scoring_elements |
0.89806 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3093 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3093 |
| reference_id |
CVE-2016-3093 |
| reference_type |
|
| scores |
| 0 |
| value |
5.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:N/I:N/A:P |
|
| 1 |
| value |
5.3 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 2 |
| value |
5.3 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3093 |
|
| 68 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 1 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 2 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 7 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 8 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 9 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 10 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 11 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 12 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 13 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 14 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 15 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 16 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 17 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 18 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 19 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 20 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 21 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 22 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 23 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
|
|
| aliases |
CVE-2016-3093, GHSA-383p-xqxx-rrmp
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-4agy-6nsx-7ufh |
|
| 5 |
| url |
VCID-579w-2k2v-efa2 |
| vulnerability_id |
VCID-579w-2k2v-efa2 |
| summary |
In Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1, using an unintentional expression in a Freemarker tag instead of string literals can lead to a RCE attack. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
| 70 |
|
| 71 |
|
| 72 |
|
| 73 |
|
| 74 |
|
| 75 |
|
| 76 |
|
| 77 |
|
| 78 |
|
| 79 |
|
| 80 |
|
| 81 |
|
| 82 |
|
| 83 |
|
| 84 |
|
| 85 |
|
| 86 |
|
| 87 |
|
| 88 |
|
| 89 |
|
| 90 |
|
| 91 |
|
| 92 |
|
| 93 |
|
| 94 |
|
| 95 |
|
| 96 |
|
| 97 |
|
| 98 |
|
| 99 |
|
| 100 |
|
| 101 |
|
| 102 |
|
| 103 |
|
| 104 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2017-12611 |
| reference_id |
CVE-2017-12611 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2017-12611 |
|
| 105 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 3 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 4 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 5 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 6 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 7 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 8 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 9 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 10 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 11 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 12 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 13 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 14 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 15 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 16 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 17 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 18 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 19 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 20 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 21 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 22 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 23 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 24 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
|
| aliases |
CVE-2017-12611, GHSA-8fx9-5hx8-crhm
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-579w-2k2v-efa2 |
|
| 6 |
| url |
VCID-6241-shkt-s7ew |
| vulnerability_id |
VCID-6241-shkt-s7ew |
| summary |
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted action name that is not properly handled during wildcard matching, a different vulnerability than CVE-2013-2135. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2134 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91526 |
| scoring_system |
epss |
| scoring_elements |
0.99672 |
| published_at |
2026-04-13T12:55:00Z |
|
| 1 |
| value |
0.91526 |
| scoring_system |
epss |
| scoring_elements |
0.99674 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.91526 |
| scoring_system |
epss |
| scoring_elements |
0.99673 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.91526 |
| scoring_system |
epss |
| scoring_elements |
0.99671 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.92052 |
| scoring_system |
epss |
| scoring_elements |
0.997 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.92052 |
| scoring_system |
epss |
| scoring_elements |
0.99701 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.92052 |
| scoring_system |
epss |
| scoring_elements |
0.99699 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2134 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 8 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 12 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 13 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 14 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 15 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 16 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 17 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 18 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 19 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 20 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 21 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 26 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 27 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 28 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 29 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 30 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 31 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 32 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 33 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 34 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 35 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 36 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 37 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 38 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 39 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
|
|
| aliases |
CVE-2013-2134, GHSA-gqqm-564f-vvxq
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6241-shkt-s7ew |
|
| 7 |
| url |
VCID-6hrc-fm64-ckhf |
| vulnerability_id |
VCID-6hrc-fm64-ckhf |
| summary |
Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79227 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79154 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.7916 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79185 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79171 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79196 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79204 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79228 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.79213 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01235 |
| scoring_system |
epss |
| scoring_elements |
0.7923 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-2162 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2162 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-2162 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
|
| 69 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.28 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.28 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 7 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 8 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 9 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 10 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 11 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 12 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 13 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 14 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 15 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 16 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 17 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 18 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 19 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 20 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 21 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 22 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 23 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 24 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.28 |
|
|
| aliases |
CVE-2016-2162, GHSA-2j4q-9fff-236j
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6hrc-fm64-ckhf |
|
| 8 |
| url |
VCID-6t1x-s2k2-b7bq |
| vulnerability_id |
VCID-6t1x-s2k2-b7bq |
| summary |
Apache Struts 2.0.0 through 2.3.15.1 allows remote attackers to bypass access controls via a crafted action: prefix. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4310 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92506 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92485 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.9249 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92496 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92498 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92507 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92456 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92462 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92471 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.08725 |
| scoring_system |
epss |
| scoring_elements |
0.92474 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4310 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.15.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.15.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 8 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 9 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 13 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 14 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 15 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 16 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 17 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 21 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 22 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 23 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 24 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 25 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 26 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 27 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 28 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 29 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 30 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 31 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 32 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 33 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 34 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 35 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.15.3 |
|
|
| aliases |
CVE-2013-4310, GHSA-q5q8-jghf-3pm3
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-6t1x-s2k2-b7bq |
|
| 9 |
| url |
VCID-759g-hsfg-97f8 |
| vulnerability_id |
VCID-759g-hsfg-97f8 |
| summary |
Multiple open redirect vulnerabilities in Apache Struts 2.0.0 through 2.3.15 allow remote attackers to redirect users to arbitrary web sites and conduct phishing attacks via a URL in a parameter using the (1) redirect: or (2) redirectAction: prefix. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2248 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99693 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99698 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99697 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99696 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99695 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99694 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.91954 |
| scoring_system |
epss |
| scoring_elements |
0.99692 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2248 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.15.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.15.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 8 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 9 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 10 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 22 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 23 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 24 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 25 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 26 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 27 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 28 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 29 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 30 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 31 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 32 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 33 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 34 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 35 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 36 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 37 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.15.1 |
|
|
| aliases |
CVE-2013-2248, GHSA-rpj9-r897-wc6q
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-759g-hsfg-97f8 |
|
| 10 |
| url |
VCID-79j9-v8gz-rfax |
| vulnerability_id |
VCID-79j9-v8gz-rfax |
| summary |
Remote code execution in Apache Struts
Forced OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. |
| references |
| 0 |
| reference_url |
http://jvn.jp/en/jp/JVN43969166/index.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-06T20:53:17Z/ |
|
|
| url |
http://jvn.jp/en/jp/JVN43969166/index.html |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://cwiki.apache.org/confluence/display/WW/S2-061 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-06T20:53:17Z/ |
|
|
| url |
https://cwiki.apache.org/confluence/display/WW/S2-061 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
|
| fixed_packages |
|
| aliases |
CVE-2020-17530, GHSA-jc35-q369-45pv
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-79j9-v8gz-rfax |
|
| 11 |
| url |
VCID-87fh-rvvb-6ubq |
| vulnerability_id |
VCID-87fh-rvvb-6ubq |
| summary |
Apache Struts file upload logic is flawed
File upload logic is flawed vulnerability in Apache Struts. An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
This issue affects Apache Struts: from 2.0.0 before 6.4.0.
Users are recommended to upgrade to version 6.4.0 at least and migrate to the new file upload mechanism https://struts.apache.org/core-developers/file-upload. If you are not using an old file upload logic based on FileuploadInterceptor your application is safe.
You can find more details in https://cwiki.apache.org/confluence/display/WW/S2-067 . |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53677 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91785 |
| scoring_system |
epss |
| scoring_elements |
0.99684 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.91785 |
| scoring_system |
epss |
| scoring_elements |
0.99685 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.91785 |
| scoring_system |
epss |
| scoring_elements |
0.99686 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.93053 |
| scoring_system |
epss |
| scoring_elements |
0.99788 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.93053 |
| scoring_system |
epss |
| scoring_elements |
0.99789 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.93053 |
| scoring_system |
epss |
| scoring_elements |
0.99791 |
| published_at |
2026-04-18T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2024-53677 |
|
| 2 |
| reference_url |
https://cwiki.apache.org/confluence/display/WW/S2-067 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Track |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2024-12-12T15:19:19Z/ |
|
|
| url |
https://cwiki.apache.org/confluence/display/WW/S2-067 |
|
| 3 |
|
| 4 |
| reference_url |
https://github.com/apache/struts |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.5 |
| scoring_system |
cvssv4 |
| scoring_elements |
CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:A/V:C/RE:L/U:Red |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://github.com/apache/struts |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2024-53677, GHSA-43mq-6xmg-29vm
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-87fh-rvvb-6ubq |
|
| 12 |
| url |
VCID-8bsh-bshc-vkgq |
| vulnerability_id |
VCID-8bsh-bshc-vkgq |
| summary |
Apache Struts forced double OGNL evaluation
Apache Struts 2.x before 2.3.29 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-0785. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4461 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82248 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82338 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82304 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82262 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82267 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82309 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82315 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82296 |
| published_at |
2026-04-09T12:55:00Z |
|
| 8 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82288 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.01704 |
| scoring_system |
epss |
| scoring_elements |
0.82235 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4461 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4461 |
| reference_id |
CVE-2016-4461 |
| reference_type |
|
| scores |
| 0 |
| value |
9.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4461 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4461, GHSA-864w-r5qj-h6fj
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8bsh-bshc-vkgq |
|
| 13 |
| url |
VCID-8mws-fbmg-cqa9 |
| vulnerability_id |
VCID-8mws-fbmg-cqa9 |
| summary |
Cross-site Scripting in Apache Struts
When the Struts2 debug mode is turned on, under certain conditions an arbitrary script may be executed in the 'Problem Report' screen. Also if JSP files are exposed to be accessed directly it's possible to execute an arbitrary script.
It is generally not advisable to have debug mode switched on outside of the development environment. Debug mode should always be turned off in production setup. Also never expose JSPs files directly and hide them inside WEB-INF folder or define dedicated security constraints to block access to raw JSP files.
Struts >= 2.3.20 is not vulnerable to this attack. We recommend upgrading to Struts 2.3.20 or higher if turning off debug mode is not possible. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2992 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76939 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76895 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76944 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76884 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76922 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76897 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76834 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76841 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76902 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76871 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.00992 |
| scoring_system |
epss |
| scoring_elements |
0.76853 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-2992 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2015-2992, GHSA-265r-pp83-gww7
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-8mws-fbmg-cqa9 |
|
| 14 |
| url |
VCID-95ts-vpk6-uubg |
| vulnerability_id |
VCID-95ts-vpk6-uubg |
| summary |
Apache Struts has a Denial of Service vulnerability
Denial of Service vulnerability in Apache Struts, file leak in multipart request processing causes disk exhaustion.
This issue affects Apache Struts: from 2.0.0 through 6.7.4, from 7.0.0 through 7.0.3.
Users are recommended to upgrade to version 6.8.0 or 7.1.1, which fixes the issue. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-66675 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31685 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31628 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31599 |
| published_at |
2026-04-08T12:55:00Z |
|
| 3 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31547 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00124 |
| scoring_system |
epss |
| scoring_elements |
0.31729 |
| published_at |
2026-04-04T12:55:00Z |
|
| 5 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40748 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40786 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40752 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40733 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00189 |
| scoring_system |
epss |
| scoring_elements |
0.40778 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-66675 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-66675, GHSA-rg58-xhh7-mqjw
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-95ts-vpk6-uubg |
|
| 15 |
| url |
VCID-at5c-f8p8-67fh |
| vulnerability_id |
VCID-at5c-f8p8-67fh |
| summary |
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4003 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85608 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85711 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85706 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85684 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85687 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85691 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85677 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85665 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85645 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.85638 |
| published_at |
2026-04-04T12:55:00Z |
|
| 10 |
| value |
0.02629 |
| scoring_system |
epss |
| scoring_elements |
0.8562 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4003 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4003 |
| reference_id |
CVE-2016-4003 |
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4003 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 1 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 2 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 7 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 8 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 9 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 10 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 11 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 12 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 13 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 14 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 15 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 16 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 17 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 18 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 19 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 20 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 21 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 22 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 23 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.28 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.28 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 7 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 8 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 9 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 10 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 11 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 12 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 13 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 14 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 15 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 16 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 17 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 18 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 19 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 20 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 21 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 22 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 23 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 24 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.28 |
|
|
| aliases |
CVE-2016-4003, GHSA-m3x6-9v6h-4g28
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-at5c-f8p8-67fh |
|
| 16 |
| url |
VCID-b59n-uxft-4qgz |
| vulnerability_id |
VCID-b59n-uxft-4qgz |
| summary |
Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4316 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90858 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.9086 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90836 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90838 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90784 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90789 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90829 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90801 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90823 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.06168 |
| scoring_system |
epss |
| scoring_elements |
0.90812 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-4316 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.15.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.15.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 8 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 9 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 10 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 17 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 18 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 19 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 20 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 21 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 22 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 23 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 24 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 25 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 26 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 27 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 28 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 29 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 30 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 31 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 32 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 33 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 34 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 35 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 36 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.15.2 |
|
|
| aliases |
CVE-2013-4316, GHSA-j7h6-xr7g-m2c5
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b59n-uxft-4qgz |
|
| 17 |
| url |
VCID-b7zy-qhz9-tuar |
| vulnerability_id |
VCID-b7zy-qhz9-tuar |
| summary |
Apache Struts vulnerable to memory exhaustion
Denial of service via out of memory (OOM) owing to not properly checking of list bounds. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to OOM if developer has set struts.multipart.maxSize to a value equal or greater than the available memory.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34149 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19623 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19344 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19577 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19474 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00062 |
| scoring_system |
epss |
| scoring_elements |
0.19422 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20662 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.2055 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20553 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.20567 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00066 |
| scoring_system |
epss |
| scoring_elements |
0.2062 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34149 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34149, GHSA-8f6x-v685-g2xc
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-b7zy-qhz9-tuar |
|
| 18 |
| url |
VCID-bgbt-j1n9-6yg5 |
| vulnerability_id |
VCID-bgbt-j1n9-6yg5 |
| summary |
The Apache Struts REST Plugin is using XStream library which is vulnerable and allow perform a DoS attack when using a malicious request with specially crafted XML payload. Upgrade to the Apache Struts version 2.5.16 and switch to an optional Jackson XML handler as described here http://struts.apache.org/plugins/rest/#custom-contenttypehandlers. Another option is to implement a custom XML handler based on the Jackson XML handler from the Apache Struts 2.5.16. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1327 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90902 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90905 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.9088 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90881 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90872 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90866 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90854 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90844 |
| published_at |
2026-04-04T12:55:00Z |
|
| 8 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90833 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.0622 |
| scoring_system |
epss |
| scoring_elements |
0.90828 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2018-1327 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-1327, GHSA-38cr-2ph5-frr9
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| url |
VCID-cm62-bsdz-yye2 |
| vulnerability_id |
VCID-cm62-bsdz-yye2 |
| summary |
Apache Struts versions 2.3 to 2.3.34 and 2.5 to 2.5.16 suffer from possible Remote Code Execution when alwaysSelectFullNamespace is true (either by user or a plugin like Convention Plugin) and then: results are used with no namespace and in same time, its upper package have no or wildcard namespace and similar to results, same possibility when using url tag which doesn't have value and action set and in same time, its upper package have no or wildcard namespace. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://cwiki.apache.org/confluence/display/WW/S2-057 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:01:33Z/ |
|
|
| url |
https://cwiki.apache.org/confluence/display/WW/S2-057 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
| reference_url |
https://lgtm.com/blog/apache_struts_CVE-2018-11776 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:01:33Z/ |
|
|
| url |
https://lgtm.com/blog/apache_struts_CVE-2018-11776 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
| reference_url |
http://www.securityfocus.com/bid/105125 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:01:33Z/ |
|
|
| url |
http://www.securityfocus.com/bid/105125 |
|
| 28 |
| reference_url |
http://www.securitytracker.com/id/1041547 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:01:33Z/ |
|
|
| url |
http://www.securitytracker.com/id/1041547 |
|
| 29 |
| reference_url |
http://www.securitytracker.com/id/1041888 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:01:33Z/ |
|
|
| url |
http://www.securitytracker.com/id/1041888 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
| reference_url |
https://github.com/hook-s3c/CVE-2018-11776-Python-PoC |
| reference_id |
CVE-2018-11776-PYTHON-POC |
| reference_type |
|
| scores |
| 0 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
8.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Attend |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:N/T:T/P:M/B:A/M:M/D:A/2025-02-06T21:01:33Z/ |
|
|
| url |
https://github.com/hook-s3c/CVE-2018-11776-Python-PoC |
|
| 42 |
|
| 43 |
|
|
| fixed_packages |
|
| aliases |
CVE-2018-11776, GHSA-cr6j-3jp9-rw65
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.8 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-cm62-bsdz-yye2 |
|
| 20 |
| url |
VCID-dk2f-14xj-9bf8 |
| vulnerability_id |
VCID-dk2f-14xj-9bf8 |
| summary |
Apache Struts vulnerable to memory exhaustion
Denial of service via out of memory (OOM) owing to no sanity limit on normal form fields in multipart forms. When a Multipart request has non-file normal form fields, Struts used to bring them into memory as Strings without checking their sizes. This could lead to an OOM if developer has set struts.multipart.maxSize to a value equal or greater than the available memory.
Upgrade to Struts 2.5.31 or 6.1.2.1 or greater |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34396 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30099 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30232 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30281 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30194 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.00115 |
| scoring_system |
epss |
| scoring_elements |
0.30159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.3147 |
| published_at |
2026-04-11T12:55:00Z |
|
| 6 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31404 |
| published_at |
2026-04-18T12:55:00Z |
|
| 7 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31425 |
| published_at |
2026-04-16T12:55:00Z |
|
| 8 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31391 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00123 |
| scoring_system |
epss |
| scoring_elements |
0.31428 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-34396 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-34396, GHSA-4g42-gqrg-4633
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-dk2f-14xj-9bf8 |
|
| 21 |
| url |
VCID-evh9-mua1-2bem |
| vulnerability_id |
VCID-evh9-mua1-2bem |
| summary |
XWork ParameterInterceptors bypass allows remote command execution
The OGNL extensive expression evaluation capability in this package as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive allowlist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the `#context`, `#_memberAccess`, `#root`, `#this`, `#_typeResolver`, `#_classResolver`, `#_traceEvaluations`, `#_lastEvaluation`, `#_keepLastEvaluation`, and possibly other OGNL context variables, a different vulnerability than CVE-2008-6504. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1870 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92533 |
| scoring_system |
epss |
| scoring_elements |
0.99735 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.92533 |
| scoring_system |
epss |
| scoring_elements |
0.99739 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.92533 |
| scoring_system |
epss |
| scoring_elements |
0.99738 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.92533 |
| scoring_system |
epss |
| scoring_elements |
0.99736 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2010-1870 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.2.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.2.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-gv5f-auvz-5fda |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 27 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 28 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 29 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 30 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 31 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 32 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 33 |
| vulnerability |
VCID-nmgp-r7hb-5ke1 |
|
| 34 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 35 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 36 |
| vulnerability |
VCID-r28t-sdc5-kbga |
|
| 37 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 38 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 39 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 40 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 41 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 42 |
| vulnerability |
VCID-x65e-31g3-77bp |
|
| 43 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 44 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 45 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 46 |
| vulnerability |
VCID-z1gf-169n-m3af |
|
| 47 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 48 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.2.1 |
|
|
| aliases |
CVE-2010-1870, GHSA-x5fc-pgpx-59j5
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-evh9-mua1-2bem |
|
| 22 |
| url |
VCID-fv6w-cdtc-kkhx |
| vulnerability_id |
VCID-fv6w-cdtc-kkhx |
| summary |
Struts ParameterInterceptor vulnerability allows remote command execution
Regular expression in ParametersInterceptor matches `top['foo'](0)` as a valid expression, which OGNL treats as `(top['foo'])(0)` and evaluates the value of 'foo' action parameter as an OGNL expression. This lets malicious users put arbitrary OGNL statements into any String variable exposed by an action and have it evaluated as an OGNL expression and since OGNL statement is in HTTP parameter value attacker can use blacklisted characters (e.g. #) to disable method execution and execute arbitrary methods, bypassing the ParametersInterceptor and OGNL library protections. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3923 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91054 |
| scoring_system |
epss |
| scoring_elements |
0.99643 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.91054 |
| scoring_system |
epss |
| scoring_elements |
0.99638 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.91054 |
| scoring_system |
epss |
| scoring_elements |
0.99637 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.91054 |
| scoring_system |
epss |
| scoring_elements |
0.9964 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.91054 |
| scoring_system |
epss |
| scoring_elements |
0.99641 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-3923 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.1.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.1.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 10 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 11 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 12 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 13 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 14 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 15 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 16 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 17 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 18 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 19 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 20 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 21 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 22 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 23 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 27 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 28 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 29 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 30 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 31 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 32 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 33 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 34 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 35 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 36 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 37 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 38 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 39 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 40 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 41 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 42 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 43 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 44 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.1.2 |
|
|
| aliases |
CVE-2011-3923, GHSA-j68f-8h6p-9h5q
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-fv6w-cdtc-kkhx |
|
| 23 |
| url |
VCID-gfxq-vtry-bqgg |
| vulnerability_id |
VCID-gfxq-vtry-bqgg |
| summary |
Files or Directories Accessible to External Parties
An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution.
Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50164 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92864 |
| scoring_system |
epss |
| scoring_elements |
0.99769 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.93657 |
| scoring_system |
epss |
| scoring_elements |
0.99842 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.93657 |
| scoring_system |
epss |
| scoring_elements |
0.99841 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.93657 |
| scoring_system |
epss |
| scoring_elements |
0.99844 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.93657 |
| scoring_system |
epss |
| scoring_elements |
0.99843 |
| published_at |
2026-04-12T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2023-50164 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
|
| aliases |
CVE-2023-50164, GHSA-2j39-qcjm-428w
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gfxq-vtry-bqgg |
|
| 24 |
| url |
VCID-gv5f-auvz-5fda |
| vulnerability_id |
VCID-gv5f-auvz-5fda |
| summary |
The ParameterInterceptor component in Apache Struts before 2.3.1.1 does not prevent access to public constructors, which allows remote attackers to create or overwrite arbitrary files via a crafted parameter that triggers the creation of a Java object. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0393 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98216 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98215 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98209 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98207 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98206 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98201 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.982 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98193 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.58542 |
| scoring_system |
epss |
| scoring_elements |
0.98196 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0393 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 26 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 27 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 28 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 33 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 34 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 35 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 36 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 37 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 38 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 39 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 40 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 41 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 42 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 43 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.1.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.1.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 10 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 11 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 12 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 13 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 14 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 15 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 16 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 17 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 18 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 19 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 20 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 21 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 22 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 23 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 24 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 25 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 26 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 27 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 28 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 29 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 30 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 31 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 32 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 33 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 34 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 35 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 36 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 37 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 38 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 39 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 40 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 41 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 42 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 43 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 44 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 45 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.1.1 |
|
|
| aliases |
CVE-2012-0393, GHSA-hxqq-w4mr-mc62
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-gv5f-auvz-5fda |
|
| 25 |
| url |
VCID-h4yg-zrv6-aqa1 |
| vulnerability_id |
VCID-h4yg-zrv6-aqa1 |
| summary |
ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0112 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.99666 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.99659 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.9966 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.99661 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.99663 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.99664 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.91424 |
| scoring_system |
epss |
| scoring_elements |
0.99665 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0112 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 8 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 9 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 13 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 14 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 15 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 16 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 17 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 24 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 31 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2014-0112, GHSA-prjv-jj26-wf8h
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-h4yg-zrv6-aqa1 |
|
| 26 |
| url |
VCID-hgj2-vqzn-gyeb |
| vulnerability_id |
VCID-hgj2-vqzn-gyeb |
| summary |
Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{...} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2021-31805 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93956 |
| scoring_system |
epss |
| scoring_elements |
0.99886 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.93956 |
| scoring_system |
epss |
| scoring_elements |
0.99883 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.93956 |
| scoring_system |
epss |
| scoring_elements |
0.99885 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.93956 |
| scoring_system |
epss |
| scoring_elements |
0.99884 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.93956 |
| scoring_system |
epss |
| scoring_elements |
0.99881 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.93956 |
| scoring_system |
epss |
| scoring_elements |
0.99882 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2021-31805 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2021-31805, GHSA-v8j6-6c2r-r27c
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hgj2-vqzn-gyeb |
|
| 27 |
| url |
VCID-hkjh-35ye-1ugj |
| vulnerability_id |
VCID-hkjh-35ye-1ugj |
| summary |
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. NOTE: this issue is due to an incomplete fix for CVE-2013-1966. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2115 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.87487 |
| scoring_system |
epss |
| scoring_elements |
0.99454 |
| published_at |
2026-04-01T12:55:00Z |
|
| 1 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99469 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99465 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99464 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99463 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99462 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99461 |
| published_at |
2026-04-07T12:55:00Z |
|
| 8 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99459 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.8761 |
| scoring_system |
epss |
| scoring_elements |
0.99457 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2115 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.14.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.14.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 10 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 11 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 12 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 13 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 14 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 15 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 16 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 17 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 18 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 19 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 20 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 21 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 22 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 23 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 27 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 28 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 33 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 34 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 35 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 36 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 37 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 38 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 39 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 40 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 41 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 42 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.14.2 |
|
|
| aliases |
CVE-2013-2115, GHSA-7ghm-rpc7-p7g5
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-hkjh-35ye-1ugj |
|
| 28 |
| url |
VCID-j5su-cnqd-6yad |
| vulnerability_id |
VCID-j5su-cnqd-6yad |
| summary |
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0785 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95104 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95107 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95105 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95093 |
| published_at |
2026-04-01T12:55:00Z |
|
| 4 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95139 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95136 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95128 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95125 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95123 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95118 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.17798 |
| scoring_system |
epss |
| scoring_elements |
0.95114 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-0785 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-0785 |
| reference_id |
CVE-2016-0785 |
| reference_type |
|
| scores |
| 0 |
| value |
9.0 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:C/I:C/A:C |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-0785 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 3 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 4 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 5 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 6 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 7 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 8 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 9 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 10 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 11 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 12 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 13 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 14 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 15 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 16 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 17 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 18 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 19 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 20 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 21 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 22 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 23 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 24 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20.3 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 1 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 2 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 7 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 8 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 9 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 10 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 11 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 12 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 13 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 14 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 15 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 16 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 17 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 18 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 19 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 20 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 21 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 22 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 23 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.24.3 |
|
| 2 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.28 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.28 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 1 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 2 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 7 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 8 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 9 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 10 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 11 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 12 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 13 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 14 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 15 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 16 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 17 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 18 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 19 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 20 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 21 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 22 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 23 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 24 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.28 |
|
|
| aliases |
CVE-2016-0785, GHSA-876p-4wgc-75rx
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.1 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-j5su-cnqd-6yad |
|
| 29 |
| url |
VCID-k6mz-k1yb-4uej |
| vulnerability_id |
VCID-k6mz-k1yb-4uej |
| summary |
CSRF protection bypass
The token check mechanism in this package does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4386 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87045 |
| published_at |
2026-04-07T12:55:00Z |
|
| 1 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87065 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87096 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87092 |
| published_at |
2026-04-16T12:55:00Z |
|
| 4 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87076 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87081 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87022 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87086 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87033 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87073 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.03235 |
| scoring_system |
epss |
| scoring_elements |
0.87052 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4386 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.4.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.4.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 10 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 11 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 12 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 13 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 14 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 15 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 16 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 17 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 18 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 19 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 20 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 21 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 22 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 23 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 27 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 28 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 33 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 34 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 35 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 36 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 37 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 38 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 39 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 40 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 41 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 42 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.4.1 |
|
|
| aliases |
CVE-2012-4386, GHSA-2rvh-q539-q33v
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-k6mz-k1yb-4uej |
|
| 30 |
| url |
VCID-kdsa-599r-eud7 |
| vulnerability_id |
VCID-kdsa-599r-eud7 |
| summary |
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0094 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.93134 |
| scoring_system |
epss |
| scoring_elements |
0.99795 |
| published_at |
2026-04-08T12:55:00Z |
|
| 1 |
| value |
0.93134 |
| scoring_system |
epss |
| scoring_elements |
0.99794 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.93134 |
| scoring_system |
epss |
| scoring_elements |
0.99798 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.93134 |
| scoring_system |
epss |
| scoring_elements |
0.99796 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0094 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 8 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 9 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 13 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 14 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 15 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 16 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 17 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 24 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 31 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
|
|
| aliases |
CVE-2014-0094, GHSA-vrwc-qjmw-5rjm
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-kdsa-599r-eud7 |
|
| 31 |
| url |
VCID-me84-wy85-hkf5 |
| vulnerability_id |
VCID-me84-wy85-hkf5 |
| summary |
Cross-Site Scripting vulnerability on "Problem Report" screen
When Debug mode is turned on, under certain conditions an arbitrary script may be executed in the `Problem Report` screen. Also if JSP files are exposed to be accessed directly it's possible to execute an arbitrary script. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78917 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78844 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.7885 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78879 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78861 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78886 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78893 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78916 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.789 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78891 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.01198 |
| scoring_system |
epss |
| scoring_elements |
0.78919 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-5169 |
|
| 4 |
|
| 5 |
|
| 6 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2015-5169 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
4.3 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:M/Au:N/C:N/I:P/A:N |
|
| 1 |
| value |
6.1 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 2 |
| value |
6.1 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N |
|
| 3 |
| value |
MODERATE |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2015-5169 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2015-5169, GHSA-vwhv-j36g-5rm8
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-me84-wy85-hkf5 |
|
| 32 |
| url |
VCID-n2dn-bnjc-13gp |
| vulnerability_id |
VCID-n2dn-bnjc-13gp |
| summary |
CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0113 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.99204 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.99211 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.99208 |
| published_at |
2026-04-07T12:55:00Z |
|
| 3 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.9921 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.992 |
| published_at |
2026-04-01T12:55:00Z |
|
| 5 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.99202 |
| published_at |
2026-04-02T12:55:00Z |
|
| 6 |
| value |
0.82051 |
| scoring_system |
epss |
| scoring_elements |
0.99209 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0113 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 8 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 9 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 13 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 14 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 15 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 16 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 17 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 24 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 31 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.16.2 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2014-0113, GHSA-3c5c-xrq4-qhr8
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n2dn-bnjc-13gp |
|
| 33 |
| url |
VCID-n4fb-crnk-eugz |
| vulnerability_id |
VCID-n4fb-crnk-eugz |
| summary |
Apache Struts Showcase App 2.0.0 through 2.3.13, as used in Struts 2 before 2.3.14.3, allows remote attackers to execute arbitrary OGNL code via a crafted parameter name that is not properly handled when invoking a redirect. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1965 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91789 |
| scoring_system |
epss |
| scoring_elements |
0.99686 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.91789 |
| scoring_system |
epss |
| scoring_elements |
0.9969 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.91789 |
| scoring_system |
epss |
| scoring_elements |
0.99689 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.91789 |
| scoring_system |
epss |
| scoring_elements |
0.99687 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.91789 |
| scoring_system |
epss |
| scoring_elements |
0.99684 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.91789 |
| scoring_system |
epss |
| scoring_elements |
0.99688 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1965 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 8 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 12 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 13 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 14 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 15 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 16 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 17 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 18 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 19 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 20 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 21 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 26 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 27 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 28 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 29 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 30 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 31 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 32 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 33 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 34 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 35 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 36 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 37 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 38 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 39 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
|
|
| aliases |
CVE-2013-1965, GHSA-whmq-v94q-34p9
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-n4fb-crnk-eugz |
|
| 34 |
| url |
VCID-nmgp-r7hb-5ke1 |
| vulnerability_id |
VCID-nmgp-r7hb-5ke1 |
| summary |
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0391 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99498 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99488 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.9949 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99492 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99493 |
| published_at |
2026-04-09T12:55:00Z |
|
| 5 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99494 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99495 |
| published_at |
2026-04-12T12:55:00Z |
|
| 7 |
| value |
0.88319 |
| scoring_system |
epss |
| scoring_elements |
0.99497 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0391 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
| reference_url |
http://www.exploit-db.com/exploits/18329 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 2 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-10T20:07:52Z/ |
|
|
| url |
http://www.exploit-db.com/exploits/18329 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 26 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 27 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 28 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 33 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 34 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 35 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 36 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 37 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 38 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 39 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 40 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 41 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 42 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 43 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
|
|
| aliases |
CVE-2012-0391, GHSA-4wrr-9h5r-m92w
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-nmgp-r7hb-5ke1 |
|
| 35 |
| url |
VCID-q96z-v3bs-k3dg |
| vulnerability_id |
VCID-q96z-v3bs-k3dg |
| summary |
Apache Struts 2.0.0 through 2.3.4 allows remote attackers to cause a denial of service (CPU consumption) via a long parameter name, which is processed as an OGNL expression. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4387 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92019 |
| published_at |
2026-04-04T12:55:00Z |
|
| 1 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92056 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92059 |
| published_at |
2026-04-16T12:55:00Z |
|
| 3 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92044 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92043 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.9204 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92011 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92037 |
| published_at |
2026-04-08T12:55:00Z |
|
| 8 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92024 |
| published_at |
2026-04-07T12:55:00Z |
|
| 9 |
| value |
0.07916 |
| scoring_system |
epss |
| scoring_elements |
0.92003 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-4387 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.4.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.4.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 10 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 11 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 12 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 13 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 14 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 15 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 16 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 17 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 18 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 19 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 20 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 21 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 22 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 23 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 27 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 28 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 33 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 34 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 35 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 36 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 37 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 38 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 39 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 40 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 41 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 42 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.4.1 |
|
|
| aliases |
CVE-2012-4387, GHSA-hrgc-54mv-58gv
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-q96z-v3bs-k3dg |
|
| 36 |
| url |
VCID-qqm4-frqy-bua5 |
| vulnerability_id |
VCID-qqm4-frqy-bua5 |
| summary |
XSS via malicious action parameter
Multiple cross-site scripting (XSS) vulnerabilities in this package allow remote attackers to inject arbitrary web script or HTML via the namespace parameter to `actionNames.action` and `showConfig.action` in `config-browser/`. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6348 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.8605 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.86046 |
| published_at |
2026-04-16T12:55:00Z |
|
| 2 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.86028 |
| published_at |
2026-04-13T12:55:00Z |
|
| 3 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.86033 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.86035 |
| published_at |
2026-04-11T12:55:00Z |
|
| 5 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.85991 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.86011 |
| published_at |
2026-04-08T12:55:00Z |
|
| 7 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.85965 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.85976 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.8602 |
| published_at |
2026-04-09T12:55:00Z |
|
| 10 |
| value |
0.02766 |
| scoring_system |
epss |
| scoring_elements |
0.85992 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-6348 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.16 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.16 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 8 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 9 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 13 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 14 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 15 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 16 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 17 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 21 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 22 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 23 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 24 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 25 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 26 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 27 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 28 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 29 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 30 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 31 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 32 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 33 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 34 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.16 |
|
|
| aliases |
CVE-2013-6348, GHSA-3g8j-jj54-3vjg
|
| risk_score |
3.1 |
| exploitability |
0.5 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-qqm4-frqy-bua5 |
|
| 37 |
| url |
VCID-r28t-sdc5-kbga |
| vulnerability_id |
VCID-r28t-sdc5-kbga |
| summary |
The CookieInterceptor component in Apache Struts before 2.3.1.1 does not use the parameter-name whitelist, which allows remote attackers to execute arbitrary commands via a crafted HTTP Cookie header that triggers Java code execution through a static method. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0392 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99357 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99355 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99353 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99351 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99349 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99348 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.85099 |
| scoring_system |
epss |
| scoring_elements |
0.99346 |
| published_at |
2026-04-02T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0392 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 26 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 27 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 28 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 33 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 34 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 35 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 36 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 37 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 38 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 39 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 40 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 41 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 42 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 43 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
|
|
| aliases |
CVE-2012-0392, GHSA-2ppp-xj34-vvf7
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-r28t-sdc5-kbga |
|
| 38 |
| url |
VCID-tcaj-6bcg-k7g2 |
| vulnerability_id |
VCID-tcaj-6bcg-k7g2 |
| summary |
Improper Input Validation
The TextParseUtil.translateVariables method in Apache Struts 2.x before 2.3.20 allows remote attackers to execute arbitrary code via a crafted OGNL expression with ANTLR tooling. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3090 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84425 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.8433 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84345 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84365 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84367 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84389 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84395 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84412 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84406 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.02195 |
| scoring_system |
epss |
| scoring_elements |
0.84402 |
| published_at |
2026-04-13T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-3090 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
| 49 |
|
| 50 |
|
| 51 |
|
| 52 |
|
| 53 |
|
| 54 |
|
| 55 |
|
| 56 |
|
| 57 |
|
| 58 |
|
| 59 |
|
| 60 |
|
| 61 |
|
| 62 |
|
| 63 |
|
| 64 |
|
| 65 |
|
| 66 |
|
| 67 |
|
| 68 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3090 |
| reference_id |
CVE-2016-3090 |
| reference_type |
|
| scores |
| 0 |
| value |
6.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:S/C:P/I:P/A:P |
|
| 1 |
| value |
8.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
8.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
HIGH |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-3090 |
|
| 69 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2016-3090, GHSA-ggmp-fxfg-277r
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tcaj-6bcg-k7g2 |
|
| 39 |
| url |
VCID-tgd1-s1yg-9fdt |
| vulnerability_id |
VCID-tgd1-s1yg-9fdt |
| summary |
Apache Struts 2 is Missing XML Validation
Missing XML Validation vulnerability in Apache Struts, Apache Struts.
This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.
Users are recommended to upgrade to version 6.1.1, which fixes the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68493 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07598 |
| published_at |
2026-04-02T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07673 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07691 |
| published_at |
2026-04-09T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0769 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07585 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68493 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-68493, GHSA-qcfc-hmrc-59x7
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tgd1-s1yg-9fdt |
|
| 40 |
| url |
VCID-vgp6-jxqt-pbf4 |
| vulnerability_id |
VCID-vgp6-jxqt-pbf4 |
| summary |
The REST plugin in Apache Struts 2 2.3.19 through 2.3.28.1 allows remote attackers to execute arbitrary code via a crafted expression. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4438 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98352 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98334 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98336 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98339 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98341 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98346 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98347 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98349 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.9835 |
| published_at |
2026-04-13T12:55:00Z |
|
| 9 |
| value |
0.62087 |
| scoring_system |
epss |
| scoring_elements |
0.98353 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4438 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
| reference_url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4438 |
| reference_id |
CVE-2016-4438 |
| reference_type |
|
| scores |
| 0 |
| value |
7.5 |
| scoring_system |
cvssv2 |
| scoring_elements |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 3 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
|
| url |
https://nvd.nist.gov/vuln/detail/CVE-2016-4438 |
|
| 22 |
|
|
| fixed_packages |
|
| aliases |
CVE-2016-4438, GHSA-4prj-vw9j-v6pr
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vgp6-jxqt-pbf4 |
|
| 41 |
| url |
VCID-vkb9-11h4-dugp |
| vulnerability_id |
VCID-vkb9-11h4-dugp |
| summary |
Apache Struts 2 before 2.3.14.2 allows remote attackers to execute arbitrary OGNL code via a crafted request that is not properly handled when using the includeParams attribute in the (1) URL or (2) A tag. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1966 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.91096 |
| scoring_system |
epss |
| scoring_elements |
0.9964 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.91096 |
| scoring_system |
epss |
| scoring_elements |
0.99646 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.91096 |
| scoring_system |
epss |
| scoring_elements |
0.99643 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.91096 |
| scoring_system |
epss |
| scoring_elements |
0.99641 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.91096 |
| scoring_system |
epss |
| scoring_elements |
0.99642 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.91096 |
| scoring_system |
epss |
| scoring_elements |
0.99644 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-1966 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.14.2 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.14.2 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 10 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 11 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 12 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 13 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 14 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 15 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 16 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 17 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 18 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 19 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 20 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 21 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 22 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 23 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 27 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 28 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 33 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 34 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 35 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 36 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 37 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 38 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 39 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 40 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 41 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 42 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.14.2 |
|
|
| aliases |
CVE-2013-1966, GHSA-737w-mh58-cxjp
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vkb9-11h4-dugp |
|
| 42 |
| url |
VCID-vnkw-9fa2-zqcm |
| vulnerability_id |
VCID-vnkw-9fa2-zqcm |
| summary |
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2135 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99247 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99257 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99256 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99255 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99254 |
| published_at |
2026-04-08T12:55:00Z |
|
| 5 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99253 |
| published_at |
2026-04-07T12:55:00Z |
|
| 6 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.9925 |
| published_at |
2026-04-04T12:55:00Z |
|
| 7 |
| value |
0.83013 |
| scoring_system |
epss |
| scoring_elements |
0.99245 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2013-2135 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 8 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 12 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 13 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 14 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 15 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 16 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 17 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 18 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 19 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 20 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 21 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 26 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 27 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 28 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 29 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 30 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 31 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 32 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 33 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 34 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 35 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 36 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 37 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 38 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 39 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.14.3 |
|
|
| aliases |
CVE-2013-2135, GHSA-pw8r-x2qm-3h5m
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.4 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-vnkw-9fa2-zqcm |
|
| 43 |
| url |
VCID-x65e-31g3-77bp |
| vulnerability_id |
VCID-x65e-31g3-77bp |
| summary |
Multiple XSS flaws in XWork
Multiple cross-site scripting (XSS) vulnerabilities in XWork allow remote attackers to inject arbitrary web script or HTML via vectors involving an action name, the action attribute of an s:submit element, or the method attribute of an `s:submit` element. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1772 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98242 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98228 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98244 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98229 |
| published_at |
2026-04-07T12:55:00Z |
|
| 4 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98225 |
| published_at |
2026-04-02T12:55:00Z |
|
| 5 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98237 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98234 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.59227 |
| scoring_system |
epss |
| scoring_elements |
0.98223 |
| published_at |
2026-04-01T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2011-1772 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
| 24 |
|
| 25 |
|
| 26 |
|
| 27 |
|
| 28 |
|
| 29 |
|
| 30 |
|
| 31 |
|
| 32 |
|
| 33 |
|
| 34 |
|
| 35 |
|
| 36 |
|
| 37 |
|
| 38 |
|
| 39 |
|
| 40 |
|
| 41 |
|
| 42 |
|
| 43 |
|
| 44 |
|
| 45 |
|
| 46 |
|
| 47 |
|
| 48 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.2.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.2.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-gv5f-auvz-5fda |
|
| 24 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 25 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 26 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 27 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 28 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 29 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 30 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 31 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 32 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 33 |
| vulnerability |
VCID-nmgp-r7hb-5ke1 |
|
| 34 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 35 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 36 |
| vulnerability |
VCID-r28t-sdc5-kbga |
|
| 37 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 38 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 39 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 40 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 41 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 42 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 43 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 44 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 45 |
| vulnerability |
VCID-z1gf-169n-m3af |
|
| 46 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 47 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.2.3 |
|
|
| aliases |
CVE-2011-1772, GHSA-56f8-g68r-j699
|
| risk_score |
5.4 |
| exploitability |
2.0 |
| weighted_severity |
2.7 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-x65e-31g3-77bp |
|
| 44 |
| url |
VCID-xz41-1z86-37ew |
| vulnerability_id |
VCID-xz41-1z86-37ew |
| summary |
|
| references |
| 0 |
| reference_url |
http://archiva.apache.org/security.html |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:24:31Z/ |
|
|
| url |
http://archiva.apache.org/security.html |
|
| 1 |
| reference_url |
http://cxsecurity.com/issue/WLB-2014010087 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:24:31Z/ |
|
|
| url |
http://cxsecurity.com/issue/WLB-2014010087 |
|
| 2 |
|
| 3 |
|
| 4 |
| reference_url |
http://seclists.org/fulldisclosure/2013/Oct/96 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:24:31Z/ |
|
|
| url |
http://seclists.org/fulldisclosure/2013/Oct/96 |
|
| 5 |
| reference_url |
http://seclists.org/oss-sec/2014/q1/89 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H |
|
| 2 |
| value |
CRITICAL |
| scoring_system |
generic_textual |
| scoring_elements |
|
|
| 3 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:24:31Z/ |
|
|
| url |
http://seclists.org/oss-sec/2014/q1/89 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
| reference_url |
http://osvdb.org/98445 |
| reference_id |
98445 |
| reference_type |
|
| scores |
| 0 |
| value |
9.8 |
| scoring_system |
cvssv3.1 |
| scoring_elements |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
|
| 1 |
| value |
Act |
| scoring_system |
ssvc |
| scoring_elements |
SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T13:24:31Z/ |
|
|
| url |
http://osvdb.org/98445 |
|
| 20 |
|
| 21 |
|
| 22 |
|
| 23 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.15.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.15.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 8 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 9 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 10 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 22 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 23 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 24 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 25 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 26 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 27 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 28 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 29 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 30 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 31 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 32 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 33 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 34 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 35 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 36 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 37 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.15.1 |
|
|
| aliases |
CVE-2013-2251, GHSA-47qp-8v9g-39hp
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-xz41-1z86-37ew |
|
| 45 |
| url |
VCID-y5uq-a6dx-3yd4 |
| vulnerability_id |
VCID-y5uq-a6dx-3yd4 |
| summary |
Unrestricted Upload of File with Dangerous Type
A local code execution issue exists in Apache Struts2 when processing malformed XSLT files, which could let a malicious user upload and execute arbitrary files. |
| references |
| 0 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1592 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.6917 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69066 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69178 |
| published_at |
2026-04-18T12:55:00Z |
|
| 3 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69135 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69085 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69104 |
| published_at |
2026-04-04T12:55:00Z |
|
| 6 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69082 |
| published_at |
2026-04-02T12:55:00Z |
|
| 7 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69131 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.6916 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69176 |
| published_at |
2026-04-11T12:55:00Z |
|
| 10 |
| value |
0.00588 |
| scoring_system |
epss |
| scoring_elements |
0.69154 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-1592 |
|
| 1 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
| 17 |
|
| 18 |
|
| 19 |
|
| 20 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-1592, GHSA-8m5q-crqq-6pmf
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-y5uq-a6dx-3yd4 |
|
| 46 |
| url |
VCID-ygbu-vb2t-jqhx |
| vulnerability_id |
VCID-ygbu-vb2t-jqhx |
| summary |
Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4436 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90416 |
| published_at |
2026-04-02T12:55:00Z |
|
| 1 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90428 |
| published_at |
2026-04-04T12:55:00Z |
|
| 2 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90413 |
| published_at |
2026-04-01T12:55:00Z |
|
| 3 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90467 |
| published_at |
2026-04-18T12:55:00Z |
|
| 4 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90468 |
| published_at |
2026-04-16T12:55:00Z |
|
| 5 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.9046 |
| published_at |
2026-04-12T12:55:00Z |
|
| 6 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90461 |
| published_at |
2026-04-11T12:55:00Z |
|
| 7 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90453 |
| published_at |
2026-04-13T12:55:00Z |
|
| 8 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90447 |
| published_at |
2026-04-08T12:55:00Z |
|
| 9 |
| value |
0.05743 |
| scoring_system |
epss |
| scoring_elements |
0.90433 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2016-4436 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.5.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.5.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 1 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 2 |
| vulnerability |
VCID-5qtg-djvn-97ht |
|
| 3 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 4 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 5 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 6 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 7 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 8 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 9 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 10 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 11 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 12 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 13 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 14 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 15 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 16 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 17 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 18 |
| vulnerability |
VCID-zkg1-bed6-bbfv |
|
| 19 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.5.1 |
|
|
| aliases |
CVE-2016-4436, GHSA-xm92-v2mq-842q
|
| risk_score |
4.5 |
| exploitability |
0.5 |
| weighted_severity |
9.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ygbu-vb2t-jqhx |
|
| 47 |
| url |
VCID-z1gf-169n-m3af |
| vulnerability_id |
VCID-z1gf-169n-m3af |
| summary |
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. |
| references |
| 0 |
|
| 1 |
|
| 2 |
|
| 3 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0838 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.93481 |
| published_at |
2026-04-16T12:55:00Z |
|
| 1 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.93461 |
| published_at |
2026-04-13T12:55:00Z |
|
| 2 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.9346 |
| published_at |
2026-04-12T12:55:00Z |
|
| 3 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.93455 |
| published_at |
2026-04-09T12:55:00Z |
|
| 4 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.93486 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.93451 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.11109 |
| scoring_system |
epss |
| scoring_elements |
0.93443 |
| published_at |
2026-04-07T12:55:00Z |
|
| 7 |
| value |
0.13997 |
| scoring_system |
epss |
| scoring_elements |
0.94304 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.13997 |
| scoring_system |
epss |
| scoring_elements |
0.94295 |
| published_at |
2026-04-01T12:55:00Z |
|
| 9 |
| value |
0.13997 |
| scoring_system |
epss |
| scoring_elements |
0.94315 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0838 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6241-shkt-s7ew |
|
| 7 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 8 |
| vulnerability |
VCID-6t1x-s2k2-b7bq |
|
| 9 |
| vulnerability |
VCID-759g-hsfg-97f8 |
|
| 10 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 11 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 12 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 13 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 14 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 15 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 16 |
| vulnerability |
VCID-b59n-uxft-4qgz |
|
| 17 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 18 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 19 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 20 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 21 |
| vulnerability |
VCID-fv6w-cdtc-kkhx |
|
| 22 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 23 |
| vulnerability |
VCID-h4yg-zrv6-aqa1 |
|
| 24 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 25 |
| vulnerability |
VCID-hkjh-35ye-1ugj |
|
| 26 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 27 |
| vulnerability |
VCID-k6mz-k1yb-4uej |
|
| 28 |
| vulnerability |
VCID-kdsa-599r-eud7 |
|
| 29 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 30 |
| vulnerability |
VCID-n2dn-bnjc-13gp |
|
| 31 |
| vulnerability |
VCID-n4fb-crnk-eugz |
|
| 32 |
| vulnerability |
VCID-q96z-v3bs-k3dg |
|
| 33 |
| vulnerability |
VCID-qqm4-frqy-bua5 |
|
| 34 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 35 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 36 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 37 |
| vulnerability |
VCID-vkb9-11h4-dugp |
|
| 38 |
| vulnerability |
VCID-vnkw-9fa2-zqcm |
|
| 39 |
| vulnerability |
VCID-xz41-1z86-37ew |
|
| 40 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 41 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 42 |
| vulnerability |
VCID-zb3c-gnyc-yug8 |
|
| 43 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.2.3.1 |
|
|
| aliases |
CVE-2012-0838, GHSA-mwrx-hx6x-3hhv
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-z1gf-169n-m3af |
|
| 48 |
| url |
VCID-zb3c-gnyc-yug8 |
| vulnerability_id |
VCID-zb3c-gnyc-yug8 |
| summary |
CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0116 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86202 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86159 |
| published_at |
2026-04-08T12:55:00Z |
|
| 2 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86171 |
| published_at |
2026-04-09T12:55:00Z |
|
| 3 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86186 |
| published_at |
2026-04-11T12:55:00Z |
|
| 4 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86183 |
| published_at |
2026-04-12T12:55:00Z |
|
| 5 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86179 |
| published_at |
2026-04-13T12:55:00Z |
|
| 6 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86196 |
| published_at |
2026-04-16T12:55:00Z |
|
| 7 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86114 |
| published_at |
2026-04-01T12:55:00Z |
|
| 8 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.86124 |
| published_at |
2026-04-02T12:55:00Z |
|
| 9 |
| value |
0.02831 |
| scoring_system |
epss |
| scoring_elements |
0.8614 |
| published_at |
2026-04-07T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2014-0116 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
|
| fixed_packages |
| 0 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.16.3 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.16.3 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-2v7h-fght-cugn |
|
| 3 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 4 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 5 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 6 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 7 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 8 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 9 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-8mws-fbmg-cqa9 |
|
| 13 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 14 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 15 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 16 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 17 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-me84-wy85-hkf5 |
|
| 24 |
| vulnerability |
VCID-tcaj-6bcg-k7g2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.16.3 |
|
| 1 |
| url |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| purl |
pkg:maven/org.apache.struts/struts2-core@2.3.20 |
| is_vulnerable |
true |
| affected_by_vulnerabilities |
| 0 |
| vulnerability |
VCID-2chz-36wn-9fcv |
|
| 1 |
| vulnerability |
VCID-2rjv-1thm-dugt |
|
| 2 |
| vulnerability |
VCID-3yq7-n972-j7dh |
|
| 3 |
| vulnerability |
VCID-4agy-6nsx-7ufh |
|
| 4 |
| vulnerability |
VCID-579w-2k2v-efa2 |
|
| 5 |
| vulnerability |
VCID-6hrc-fm64-ckhf |
|
| 6 |
| vulnerability |
VCID-74ab-1p1c-4qbd |
|
| 7 |
| vulnerability |
VCID-79j9-v8gz-rfax |
|
| 8 |
| vulnerability |
VCID-7c97-nj5a-hqb8 |
|
| 9 |
| vulnerability |
VCID-7fgd-jnfe-gkhp |
|
| 10 |
| vulnerability |
VCID-87fh-rvvb-6ubq |
|
| 11 |
| vulnerability |
VCID-8bsh-bshc-vkgq |
|
| 12 |
| vulnerability |
VCID-95ts-vpk6-uubg |
|
| 13 |
| vulnerability |
VCID-at5c-f8p8-67fh |
|
| 14 |
| vulnerability |
VCID-b7zy-qhz9-tuar |
|
| 15 |
| vulnerability |
VCID-bgbt-j1n9-6yg5 |
|
| 16 |
| vulnerability |
VCID-cm62-bsdz-yye2 |
|
| 17 |
| vulnerability |
VCID-czjh-bpfk-3yh6 |
|
| 18 |
| vulnerability |
VCID-dk2f-14xj-9bf8 |
|
| 19 |
| vulnerability |
VCID-gfxq-vtry-bqgg |
|
| 20 |
| vulnerability |
VCID-hgj2-vqzn-gyeb |
|
| 21 |
| vulnerability |
VCID-j5su-cnqd-6yad |
|
| 22 |
| vulnerability |
VCID-mdde-pa5h-w7g4 |
|
| 23 |
| vulnerability |
VCID-p9xh-frm5-8ucp |
|
| 24 |
| vulnerability |
VCID-sf53-bgb2-7ue2 |
|
| 25 |
| vulnerability |
VCID-tgd1-s1yg-9fdt |
|
| 26 |
| vulnerability |
VCID-vgp6-jxqt-pbf4 |
|
| 27 |
| vulnerability |
VCID-y4qu-21c9-6fav |
|
| 28 |
| vulnerability |
VCID-y5uq-a6dx-3yd4 |
|
| 29 |
| vulnerability |
VCID-ygbu-vb2t-jqhx |
|
| 30 |
| vulnerability |
VCID-zxww-8kb3-tufv |
|
|
| resource_url |
http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts/struts2-core@2.3.20 |
|
|
| aliases |
CVE-2014-0116, GHSA-hmhq-382q-mp56
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zb3c-gnyc-yug8 |
|
| 49 |
| url |
VCID-zxww-8kb3-tufv |
| vulnerability_id |
VCID-zxww-8kb3-tufv |
| summary |
Improper Preservation of Permissions in Apache Struts
An access permission override in Apache Struts 2.0.0 to 2.5.20 may cause a Denial of Service when performing a file upload. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2019-0233 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91979 |
| published_at |
2026-04-18T12:55:00Z |
|
| 1 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91924 |
| published_at |
2026-04-01T12:55:00Z |
|
| 2 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91932 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.9194 |
| published_at |
2026-04-04T12:55:00Z |
|
| 4 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91946 |
| published_at |
2026-04-07T12:55:00Z |
|
| 5 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91959 |
| published_at |
2026-04-08T12:55:00Z |
|
| 6 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91964 |
| published_at |
2026-04-09T12:55:00Z |
|
| 7 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91967 |
| published_at |
2026-04-11T12:55:00Z |
|
| 8 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91966 |
| published_at |
2026-04-12T12:55:00Z |
|
| 9 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91963 |
| published_at |
2026-04-13T12:55:00Z |
|
| 10 |
| value |
0.0778 |
| scoring_system |
epss |
| scoring_elements |
0.91982 |
| published_at |
2026-04-16T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2019-0233 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
|
| fixed_packages |
|
| aliases |
CVE-2019-0233, GHSA-ccp5-gg58-pxfm
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-zxww-8kb3-tufv |
|