Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-eury-mu1z-w3bp
Summary
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Apache Tiles 2.1 before 2.1.2, as used in Apache Struts and other products, evaluates Expression Language (EL) expressions twice in certain circumstances, which allows remote attackers to conduct cross-site scripting (XSS) attacks or obtain sensitive information via unspecified vectors, related to the (1) tiles:putAttribute and (2) tiles:insertTemplate JSP tags.
Aliases
0
alias CVE-2009-1275
1
alias GHSA-2c6q-rgvj-66rx
Fixed_packages
0
url pkg:deb/debian/tiles@2.2.0-1?distro=trixie
purl pkg:deb/debian/tiles@2.2.0-1?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiles@2.2.0-1%3Fdistro=trixie
1
url pkg:deb/debian/tiles@3.0.7-4?distro=trixie
purl pkg:deb/debian/tiles@3.0.7-4?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiles@3.0.7-4%3Fdistro=trixie
2
url pkg:deb/debian/tiles@3.0.7-5?distro=trixie
purl pkg:deb/debian/tiles@3.0.7-5?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiles@3.0.7-5%3Fdistro=trixie
3
url pkg:deb/debian/tiles@3.0.7-6?distro=trixie
purl pkg:deb/debian/tiles@3.0.7-6?distro=trixie
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/tiles@3.0.7-6%3Fdistro=trixie
4
url pkg:maven/org.apache.tiles/tiles-core@2.1.2
purl pkg:maven/org.apache.tiles/tiles-core@2.1.2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-jjre-tuhb-4yat
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tiles/tiles-core@2.1.2
Affected_packages
0
url pkg:maven/org.apache.tiles/tiles-core@2.1.0
purl pkg:maven/org.apache.tiles/tiles-core@2.1.0
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-eury-mu1z-w3bp
1
vulnerability VCID-jjre-tuhb-4yat
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tiles/tiles-core@2.1.0
1
url pkg:maven/org.apache.tiles/tiles-core@2.1
purl pkg:maven/org.apache.tiles/tiles-core@2.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-eury-mu1z-w3bp
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tiles/tiles-core@2.1
2
url pkg:maven/org.apache.tiles/tiles-core@2.1.1
purl pkg:maven/org.apache.tiles/tiles-core@2.1.1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-eury-mu1z-w3bp
1
vulnerability VCID-jjre-tuhb-4yat
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.tiles/tiles-core@2.1.1
References
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2009-1275
reference_id
reference_type
scores
0
value 0.01348
scoring_system epss
scoring_elements 0.80114
published_at 2026-04-18T12:55:00Z
1
value 0.01348
scoring_system epss
scoring_elements 0.8011
published_at 2026-04-11T12:55:00Z
2
value 0.01348
scoring_system epss
scoring_elements 0.80094
published_at 2026-04-12T12:55:00Z
3
value 0.01348
scoring_system epss
scoring_elements 0.80085
published_at 2026-04-13T12:55:00Z
4
value 0.01348
scoring_system epss
scoring_elements 0.80036
published_at 2026-04-01T12:55:00Z
5
value 0.01348
scoring_system epss
scoring_elements 0.80044
published_at 2026-04-02T12:55:00Z
6
value 0.01348
scoring_system epss
scoring_elements 0.80065
published_at 2026-04-04T12:55:00Z
7
value 0.01348
scoring_system epss
scoring_elements 0.80054
published_at 2026-04-07T12:55:00Z
8
value 0.01348
scoring_system epss
scoring_elements 0.80082
published_at 2026-04-08T12:55:00Z
9
value 0.01348
scoring_system epss
scoring_elements 0.8009
published_at 2026-04-09T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2009-1275
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1275
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1275
2
reference_url http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913
reference_id
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url http://svn.apache.org/viewvc/tiles/framework/trunk/src/site/apt/security/security-bulletin-1.apt?revision=741913
3
reference_url https://nvd.nist.gov/vuln/detail/CVE-2009-1275
reference_id CVE-2009-1275
reference_type
scores
0
value MODERATE
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2009-1275
4
reference_url https://github.com/advisories/GHSA-2c6q-rgvj-66rx
reference_id GHSA-2c6q-rgvj-66rx
reference_type
scores
0
value MODERATE
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-2c6q-rgvj-66rx
Weaknesses
0
cwe_id 1035
name OWASP Top Ten 2017 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2017.
1
cwe_id 79
name Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
description The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
2
cwe_id 937
name OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities
description Weaknesses in this category are related to the A9 category in the OWASP Top Ten 2013.
3
cwe_id 87
name Improper Neutralization of Alternate XSS Syntax
description The product does not neutralize or incorrectly neutralizes user-controlled input for alternate script syntax.
4
cwe_id 917
name Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
description The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.
Exploits
Severity_range_score4.0 - 6.9
Exploitability0.5
Weighted_severity6.2
Risk_score3.1
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-eury-mu1z-w3bp