Page 6 of 52 results (0.004 seconds)

CVSS: 5.3EPSS: 92%CPEs: 26EXPL: 3

17 Aug 2010 — The OGNL extensive expression evaluation capability in XWork in Struts 2.0.0 through 2.1.8.1, as used in Atlassian Fisheye, Crucible, and possibly other products, uses a permissive whitelist, which allows remote attackers to modify server-side context objects and bypass the "#" protection mechanism in ParameterInterceptors via the (1) #context, (2) #_memberAccess, (3) #root, (4) #this, (5) #_typeResolver, (6) #_classResolver, (7) #_traceEvaluations, (8) #_lastEvaluation, (9) #_keepLastEvaluation, and possib... • https://www.exploit-db.com/exploits/17691 •

CVSS: 7.5EPSS: 87%CPEs: 7EXPL: 1

23 Mar 2009 — Multiple directory traversal vulnerabilities in Apache Struts 2.0.x before 2.0.12 and 2.1.x before 2.1.3 allow remote attackers to read arbitrary files via a ..%252f (encoded dot dot slash) in a URI with a /struts/ path, related to (1) FilterDispatcher in 2.0.x and (2) DefaultStaticContentLoader in 2.1.x. Múltiples vulnerabilidades de salto de directorio en Apache Struts v2.0.x anteriores a v2.0.12 y v2.1.x anteriores a v2.1.3, permite a atacantes remotos leer ficheros de su elección a través de ..%25f (pun... • https://www.exploit-db.com/exploits/32565 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •