Lookup for vulnerable packages by Package URL.
| Purl | pkg:maven/org.apache.struts.xwork/xwork-core@2.3.16.3 |
| Type | maven |
| Namespace | org.apache.struts.xwork |
| Name | xwork-core |
| Version | 2.3.16.3 |
| Qualifiers |
|
| Subpath | |
| Is_vulnerable | true |
| Next_non_vulnerable_version | null |
| Latest_non_vulnerable_version | null |
| Affected_by_vulnerabilities |
| 0 |
| url |
VCID-p9xh-frm5-8ucp |
| vulnerability_id |
VCID-p9xh-frm5-8ucp |
| summary |
The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote attackers to "compromise internal state of an application" via unspecified vectors. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1831 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89158 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89144 |
| published_at |
2026-04-09T12:55:00Z |
|
| 2 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89155 |
| published_at |
2026-04-11T12:55:00Z |
|
| 3 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89151 |
| published_at |
2026-04-12T12:55:00Z |
|
| 4 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89149 |
| published_at |
2026-04-13T12:55:00Z |
|
| 5 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89161 |
| published_at |
2026-04-18T12:55:00Z |
|
| 6 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89096 |
| published_at |
2026-04-01T12:55:00Z |
|
| 7 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89104 |
| published_at |
2026-04-02T12:55:00Z |
|
| 8 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89119 |
| published_at |
2026-04-04T12:55:00Z |
|
| 9 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89121 |
| published_at |
2026-04-07T12:55:00Z |
|
| 10 |
| value |
0.04514 |
| scoring_system |
epss |
| scoring_elements |
0.89139 |
| published_at |
2026-04-08T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2015-1831 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
|
| fixed_packages |
|
| aliases |
CVE-2015-1831, GHSA-q2cg-xf9p-h457
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-p9xh-frm5-8ucp |
|
| 1 |
| url |
VCID-tgd1-s1yg-9fdt |
| vulnerability_id |
VCID-tgd1-s1yg-9fdt |
| summary |
Apache Struts 2 is Missing XML Validation
Missing XML Validation vulnerability in Apache Struts, Apache Struts.
This issue affects Apache Struts: from 2.0.0 before 2.2.1; Apache Struts: from 2.2.1 through 6.1.0.
Users are recommended to upgrade to version 6.1.1, which fixes the issue. |
| references |
| 0 |
|
| 1 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68493 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07712 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07615 |
| published_at |
2026-04-07T12:55:00Z |
|
| 2 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0764 |
| published_at |
2026-04-04T12:55:00Z |
|
| 3 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07673 |
| published_at |
2026-04-08T12:55:00Z |
|
| 4 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07572 |
| published_at |
2026-04-18T12:55:00Z |
|
| 5 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07585 |
| published_at |
2026-04-16T12:55:00Z |
|
| 6 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0766 |
| published_at |
2026-04-13T12:55:00Z |
|
| 7 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07676 |
| published_at |
2026-04-12T12:55:00Z |
|
| 8 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.0769 |
| published_at |
2026-04-11T12:55:00Z |
|
| 9 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07598 |
| published_at |
2026-04-02T12:55:00Z |
|
| 10 |
| value |
0.00027 |
| scoring_system |
epss |
| scoring_elements |
0.07691 |
| published_at |
2026-04-09T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2025-68493 |
|
| 2 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
|
| fixed_packages |
|
| aliases |
CVE-2025-68493, GHSA-qcfc-hmrc-59x7
|
| risk_score |
4.0 |
| exploitability |
0.5 |
| weighted_severity |
8.0 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-tgd1-s1yg-9fdt |
|
| 2 |
| url |
VCID-ufcq-57q9-53c7 |
| vulnerability_id |
VCID-ufcq-57q9-53c7 |
| summary |
The DebuggingInterceptor component in Apache Struts before 2.3.1.1, when developer mode is used, allows remote attackers to execute arbitrary commands via unspecified vectors. NOTE: the vendor characterizes this behavior as not "a security vulnerability itself. |
| references |
| 0 |
|
| 1 |
|
| 2 |
| reference_url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0394 |
| reference_id |
|
| reference_type |
|
| scores |
| 0 |
| value |
0.92567 |
| scoring_system |
epss |
| scoring_elements |
0.99743 |
| published_at |
2026-04-21T12:55:00Z |
|
| 1 |
| value |
0.92567 |
| scoring_system |
epss |
| scoring_elements |
0.99742 |
| published_at |
2026-04-18T12:55:00Z |
|
| 2 |
| value |
0.92567 |
| scoring_system |
epss |
| scoring_elements |
0.99738 |
| published_at |
2026-04-02T12:55:00Z |
|
| 3 |
| value |
0.92567 |
| scoring_system |
epss |
| scoring_elements |
0.99741 |
| published_at |
2026-04-13T12:55:00Z |
|
| 4 |
| value |
0.92567 |
| scoring_system |
epss |
| scoring_elements |
0.99739 |
| published_at |
2026-04-04T12:55:00Z |
|
|
| url |
https://api.first.org/data/v1/epss?cve=CVE-2012-0394 |
|
| 3 |
|
| 4 |
|
| 5 |
|
| 6 |
|
| 7 |
|
| 8 |
|
| 9 |
|
| 10 |
|
| 11 |
|
| 12 |
|
| 13 |
|
| 14 |
|
| 15 |
|
| 16 |
|
|
| fixed_packages |
|
| aliases |
CVE-2012-0394, GHSA-hmvj-gc9q-mg9p
|
| risk_score |
10.0 |
| exploitability |
2.0 |
| weighted_severity |
6.2 |
| resource_url |
http://public2.vulnerablecode.io/vulnerabilities/VCID-ufcq-57q9-53c7 |
|
|
| Fixing_vulnerabilities |
|
| Risk_score | 10.0 |
| Resource_url | http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.struts.xwork/xwork-core@2.3.16.3 |