Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-3087

Опубликовано: 07 июн. 2016
Источник: debian
EPSS Высокий

Описание

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
libstruts1.2-javanot-affectedpackage

Примечания

  • https://struts.apache.org/docs/s2-033.html

EPSS

Процентиль: 99%
0.87027
Высокий

Связанные уязвимости

CVSS3: 9.8
ubuntu
больше 9 лет назад

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.

redhat
больше 9 лет назад

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.

CVSS3: 9.8
nvd
больше 9 лет назад

Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.

CVSS3: 9.8
github
больше 3 лет назад

Apache Struts vulnerable to arbitrary remote code execution due to improper input validation

EPSS

Процентиль: 99%
0.87027
Высокий