Логотип exploitDog
bind:CVE-2023-50164
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2023-50164

Количество 6

Количество 6

ubuntu логотип

CVE-2023-50164

около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
EPSS: Критический
redhat логотип

CVE-2023-50164

около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
EPSS: Критический
nvd логотип

CVE-2023-50164

около 2 лет назад

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
EPSS: Критический
debian логотип

CVE-2023-50164

около 2 лет назад

An attacker can manipulate file upload params to enable paths traversa ...

CVSS3: 9.8
EPSS: Критический
github логотип

GHSA-2j39-qcjm-428w

около 2 лет назад

Apache Struts vulnerable to path traversal

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2023-08547

около 2 лет назад

Уязвимость программной платформы Apache Struts, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2023-50164

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
93%
Критический
около 2 лет назад
redhat логотип
CVE-2023-50164

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
93%
Критический
около 2 лет назад
nvd логотип
CVE-2023-50164

An attacker can manipulate file upload params to enable paths traversal and under some circumstances this can lead to uploading a malicious file which can be used to perform Remote Code Execution. Users are recommended to upgrade to versions Struts 2.5.33 or Struts 6.3.0.2 or greater to fix this issue.

CVSS3: 9.8
93%
Критический
около 2 лет назад
debian логотип
CVE-2023-50164

An attacker can manipulate file upload params to enable paths traversa ...

CVSS3: 9.8
93%
Критический
около 2 лет назад
github логотип
GHSA-2j39-qcjm-428w

Apache Struts vulnerable to path traversal

CVSS3: 9.8
93%
Критический
около 2 лет назад
fstec логотип
BDU:2023-08547

Уязвимость программной платформы Apache Struts, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю выполнить произвольный код

CVSS3: 9.8
93%
Критический
около 2 лет назад

Уязвимостей на страницу