Количество 6
Количество 6
CVE-2012-0838
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
CVE-2012-0838
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
CVE-2012-0838
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field.
CVE-2012-0838
Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expressio ...
GHSA-mwrx-hx6x-3hhv
Apache Struts Code injection due to conversion error
BDU:2022-06203
Уязвимость программной платформы Apache Struts, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код
Уязвимостей на страницу
Уязвимость | CVSS | EPSS | Опубликовано | |
|---|---|---|---|---|
CVE-2012-0838 Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. | CVSS2: 10 | 16% Средний | почти 14 лет назад | |
CVE-2012-0838 Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. | CVSS2: 6.8 | 16% Средний | больше 14 лет назад | |
CVE-2012-0838 Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expression during the handling of a conversion error, which allows remote attackers to modify run-time data values, and consequently execute arbitrary code, via invalid input to a field. | CVSS2: 10 | 16% Средний | почти 14 лет назад | |
CVE-2012-0838 Apache Struts 2 before 2.2.3.1 evaluates a string as an OGNL expressio ... | CVSS2: 10 | 16% Средний | почти 14 лет назад | |
GHSA-mwrx-hx6x-3hhv Apache Struts Code injection due to conversion error | 16% Средний | больше 3 лет назад | ||
BDU:2022-06203 Уязвимость программной платформы Apache Struts, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю выполнить произвольный код | CVSS3: 9.8 | 16% Средний | больше 14 лет назад |
Уязвимостей на страницу