Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.tiles/tiles-core@2.1.0
Typemaven
Namespaceorg.apache.tiles
Nametiles-core
Version2.1.0
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_versionnull
Latest_non_vulnerable_versionnull
Affected_by_vulnerabilities
0
url VCID-eury-mu1z-w3bp
vulnerability_id VCID-eury-mu1z-w3bp
summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1275
reference_id
reference_type
scores
0
value 0.01348
scoring_system epss
scoring_elements 0.80114
published_at 2026-04-18T12:55:00Z
1
value 0.01348
scoring_system epss
scoring_elements 0.8011
published_at 2026-04-11T12:55:00Z
2
value 0.01348
scoring_system epss
scoring_elements 0.80094
published_at 2026-04-12T12:55:00Z
3
value 0.01348
scoring_system epss
scoring_elements 0.80085
published_at 2026-04-13T12:55:00Z
4
value 0.01348
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-01T12:55:00Z
5
value 0.01348
scoring_system epss
scoring_elements 0.80044
published_at 2026-04-02T12:55:00Z
6
value 0.01348
scoring_system epss
scoring_elements 0.80065
published_at 2026-04-04T12:55:00Z
7
value 0.01348
scoring_system epss
scoring_elements 0.80054
published_at 2026-04-07T12:55:00Z
8
value 0.01348
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-08T12:55:00Z
9
value 0.01348
scoring_system epss
scoring_elements 0.8009
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1275
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1275
2
reference_url http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-1275
reference_id CVE-2009-1275
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2009-1275
4
reference_url https://github.com/advisories/GHSA-2c6q-rgvj-66rx
reference_id GHSA-2c6q-rgvj-66rx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2c6q-rgvj-66rx
fixed_packages
0
url pkg:maven/org.apache.tiles/tiles-core@2.1.2
purl pkg:maven/org.apache.tiles/tiles-core@2.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jjre-tuhb-4yat
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tiles/tiles-core@2.1.2
aliases CVE-2009-1275, GHSA-2c6q-rgvj-66rx
risk_score 3.1
exploitability 0.5
weighted_severity 6.2
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-eury-mu1z-w3bp
1
url VCID-jjre-tuhb-4yat
vulnerability_id VCID-jjre-tuhb-4yat
summary
Apache Tiles: Unvalidated input may lead to path traversal and XXE
The value set as the DefaultLocaleResolver.LOCALE_KEY attribute on the session was not validated while resolving XML definition files, leading to possible path traversal and eventually SSRF/XXE when passing user-controlled data to this key. Passing user-controlled data to this key may be relatively common, as it was also used like that to set the language in the 'tiles-test' application shipped with Tiles.

This issue affects Apache Tiles from version 2 onwards.

NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2023-49735
reference_id
reference_type
scores
0
value 0.00856
scoring_system epss
scoring_elements 0.75009
published_at 2026-04-18T12:55:00Z
1
value 0.00856
scoring_system epss
scoring_elements 0.74954
published_at 2026-04-04T12:55:00Z
2
value 0.00856
scoring_system epss
scoring_elements 0.74928
published_at 2026-04-07T12:55:00Z
3
value 0.00856
scoring_system epss
scoring_elements 0.74962
published_at 2026-04-08T12:55:00Z
4
value 0.00856
scoring_system epss
scoring_elements 0.74974
published_at 2026-04-09T12:55:00Z
5
value 0.00856
scoring_system epss
scoring_elements 0.74996
published_at 2026-04-11T12:55:00Z
6
value 0.00856
scoring_system epss
scoring_elements 0.74975
published_at 2026-04-12T12:55:00Z
7
value 0.00856
scoring_system epss
scoring_elements 0.74965
published_at 2026-04-13T12:55:00Z
8
value 0.00856
scoring_system epss
scoring_elements 0.75002
published_at 2026-04-16T12:55:00Z
9
value 0.00856
scoring_system epss
scoring_elements 0.74925
published_at 2026-04-02T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2023-49735
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49735
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-49735
2
reference_url https://github.com/apache/tiles
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/tiles
3
reference_url https://lists.apache.org/thread/8ktm4vxr6vvc1qsxh6ft8jzmom1zl65p
reference_id
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:Y/T:P/P:M/B:A/M:M/D:T/2024-11-20T18:11:49Z/
url https://lists.apache.org/thread/8ktm4vxr6vvc1qsxh6ft8jzmom1zl65p
4
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057315
reference_id 1057315
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1057315
5
reference_url https://nvd.nist.gov/vuln/detail/CVE-2023-49735
reference_id CVE-2023-49735
reference_type
scores
0
value 7.5
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2023-49735
6
reference_url https://github.com/advisories/GHSA-qw4h-3xjj-84cc
reference_id GHSA-qw4h-3xjj-84cc
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-qw4h-3xjj-84cc
fixed_packages
aliases CVE-2023-49735, GHSA-qw4h-3xjj-84cc
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-jjre-tuhb-4yat
Fixing_vulnerabilities
Risk_score4.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tiles/tiles-core@2.1.0