Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
apache struts 2.3.20 vulnerabilities and exploits
(subscribe to this query)
9.8
CVSSv3
CVE-2016-3087
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote malicious users to execute arbitrary code via vectors related to an ! (exclamation mark) operator to the REST Plugin.
Apache Struts 2.3.28
Apache Struts 2.3.24.1
Apache Struts 2.3.20.1
Apache Struts 2.3.24
Apache Struts 2.3.20
2 EDB exploits
3 Github repositories
7.5
CVSSv3
CVE-2016-4431
Apache Struts 2 2.3.20 up to and including 2.3.28.1 allows remote malicious users to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
Apache Struts 2.3.28
Apache Struts 2.3.24.1
Apache Struts 2.3.24.3
Apache Struts 2.3.20.1
Apache Struts 2.3.24
Apache Struts 2.3.20.3
Apache Struts 2.3.20
7.5
CVSSv3
CVE-2016-4433
Apache Struts 2 2.3.20 up to and including 2.3.28.1 allows remote malicious users to bypass intended access restrictions and conduct redirection attacks via a crafted request.
Apache Struts 2.3.28
Apache Struts 2.3.24.1
Apache Struts 2.3.24.3
Apache Struts 2.3.20.1
Apache Struts 2.3.24
Apache Struts 2.3.20.3
Apache Struts 2.3.20
9.8
CVSSv3
CVE-2016-4438
The REST plugin in Apache Struts 2 2.3.19 up to and including 2.3.28.1 allows remote malicious users to execute arbitrary code via a crafted expression.
Apache Struts 2.3.28
Apache Struts 2.3.24.1
Apache Struts 2.3.24.3
Apache Struts 2.3.20.1
Apache Struts 2.3.24
Apache Struts 2.3.20.3
Apache Struts 2.3.20
8.8
CVSSv3
CVE-2016-4430
Apache Struts 2 2.3.20 up to and including 2.3.28.1 mishandles token validation, which allows remote malicious users to conduct cross-site request forgery (CSRF) attacks via unspecified vectors.
Apache Struts 2.3.28
Apache Struts 2.3.24.1
Apache Struts 2.3.24.3
Apache Struts 2.3.20.1
Apache Struts 2.3.24
Apache Struts 2.3.28.1
Apache Struts 2.3.20.3
Apache Struts 2.3.20
5.3
CVSSv3
CVE-2016-4465
The URLValidator class in Apache Struts 2 2.3.20 up to and including 2.3.28.1 and 2.5.x prior to 2.5.1 allows remote malicious users to cause a denial of service via a null value for a URL field.
Apache Struts 2.3.28
Apache Struts 2.5
Apache Struts 2.3.24.1
Apache Struts 2.3.24.3
Apache Struts 2.3.20.1
Apache Struts 2.3.24
Apache Struts 2.3.28.1
Apache Struts 2.3.20.3
Apache Struts 2.3.20
NA
CVE-2015-1831
The default exclude patterns (excludeParams) in Apache Struts 2.3.20 allow remote malicious users to "compromise internal state of an application" via unspecified vectors.
Apache Struts 2.3.20
9.8
CVSSv3
CVE-2016-6795
In the Convention plugin in Apache Struts 2.3.x prior to 2.3.31, and 2.5.x prior to 2.5.5, it is possible to prepare a special URL which will be used for path traversal and execution of arbitrary code on server side.
Apache Struts 2.3.28
Apache Struts 2.3.20.2
Apache Struts 2.3.25
Apache Struts 2.3.24.2
Apache Struts 2.3.24.1
Apache Struts 2.3.22
Apache Struts 2.3.23
Apache Struts 2.3.24.3
Apache Struts 2.3.29
Apache Struts 2.3.20.1
Apache Struts 2.3.30
Apache Struts 2.3.24
Apache Struts 2.3.28.1
Apache Struts 2.3.20.3
Apache Struts 2.3.26
Apache Struts 2.3.27
Apache Struts 2.3.21
Apache Struts 2.3.20
9.8
CVSSv3
CVE-2017-9791
The Struts 1 plugin in Apache Struts 2.1.x and 2.3.x might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage.
Apache Struts 2.3.1.1
Apache Struts 2.3.28
Apache Struts 2.3.15
Apache Struts 2.3.14
Apache Struts 2.3.32
Apache Struts 2.3.16
Apache Struts 2.3.24.1
Apache Struts 2.3.3
Apache Struts 2.3.16.3
Apache Struts 2.3.4
Apache Struts 2.3.24.3
Apache Struts 2.3.15.2
Apache Struts 2.3.29
Apache Struts 2.3.14.3
Apache Struts 2.3.4.1
Apache Struts 2.3.20.1
Apache Struts 2.3.8
Apache Struts 2.3.30
Apache Struts 2.3.7
Apache Struts 2.3.24
Apache Struts 2.3.28.1
Apache Struts 2.3.14.2
2 EDB exploits
9 Github repositories
1 Article
7.5
CVSSv3
CVE-2017-9787
When using a Spring AOP functionality to secure Struts actions it is possible to perform a DoS attack. Solution is to upgrade to Apache Struts version 2.5.12 or 2.3.33.
Apache Struts 2.5.9
Apache Struts 2.3.28
Apache Struts 2.3.20.2
Apache Struts 2.3.15
Apache Struts 2.3.25
Apache Struts 2.5.2
Apache Struts 2.3.14
Apache Struts 2.3.32
Apache Struts 2.3.13
Apache Struts 2.3.16
Apache Struts 2.3.24.2
Apache Struts 2.3.17
Apache Struts 2.5.10
Apache Struts 2.3.24.1
Apache Struts 2.3.22
Apache Struts 2.5.6
Apache Struts 2.3.9
Apache Struts 2.3.16.3
Apache Struts 2.3.23
Apache Struts 2.3.24.3
Apache Struts 2.3.15.2
Apache Struts 2.3.29
1 Article
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-38380
wireless
CVE-2024-8190
CVE-2024-45811
unauthorized
CVE-2024-8946
physical
CVE-2024-8503
CVE-2024-47049
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »