11 results (0.008 seconds)

CVSS: 7.8EPSS: 2%CPEs: 2EXPL: 0

14 Jun 2023 — Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater • http://www.openwall.com/lists/oss-security/2023/06/14/3 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 0

14 Jun 2023 — Allocation of Resources Without Limits or Throttling vulnerability in Apache Software Foundation Apache Struts.This issue affects Apache Struts: through 2.5.30, through 6.1.2. Upgrade to Struts 2.5.31 or 6.1.2.1 or greater. • http://www.openwall.com/lists/oss-security/2023/06/14/2 • CWE-770: Allocation of Resources Without Limits or Throttling •

CVSS: 8.1EPSS: 8%CPEs: 33EXPL: 0

04 Jul 2016 — ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899. ActionServlet.java en Apache Struts 1 1.x hasta la versión 1.3.10 no maneja adecuadamente accesos multihilo para una instancia ActionForm, lo que permite a atacantes remotos ejecutar código arbitrario o provocar una denegació... • http://jvn.jp/en/jp/JVN03188560/index.html •

CVSS: 8.2EPSS: 3%CPEs: 28EXPL: 0

04 Jul 2016 — ActionServlet.java in Apache Struts 1 1.x through 1.3.10 does not properly restrict the Validator configuration, which allows remote attackers to conduct cross-site scripting (XSS) attacks or cause a denial of service via crafted input, a related issue to CVE-2015-0899. ActionServlet.java en Apache Struts 1 1.x hasta la versión 1.3.10 no restringe adecuadamente la configuración Validator, lo que permite a atacantes remotos llevar a cabo ataques de secuencias de comandos en sitios cruzados (XSS) o provocar u... • http://jvn.jp/en/jp/JVN65044642/index.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 87%CPEs: 17EXPL: 0

31 Mar 2016 — The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter. La implementación MultiPageValidator en Apache Struts 1 1.1 hasta la versión 1.3.10 permite a atacantes remotos eludir las restricciones destinadas al acceso a través de un parámetro page modificado. It was discovered that libstruts1.2-java, a Java framework for MVC applications, contains a bug in its multi-page validation code. This allows... • http://jvn.jp/en/jp/JVN86448949/index.html • CWE-20: Improper Input Validation •

CVSS: 7.5EPSS: 92%CPEs: 18EXPL: 5

29 Apr 2014 — Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1. Apache Commons BeanUtils, según se distribuye en lib/commons-beanutils-1.... • https://packetstorm.news/files/id/149050 • CWE-20: Improper Input Validation CWE-470: Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection') •

CVSS: 6.1EPSS: 2%CPEs: 9EXPL: 0

09 Apr 2009 — Cross-site scripting (XSS) vulnerability in Apache Struts before 1.2.9-162.31.1 on SUSE Linux Enterprise (SLE) 11, before 1.2.9-108.2 on SUSE openSUSE 10.3, before 1.2.9-198.2 on SUSE openSUSE 11.0, and before 1.2.9-162.163.2 on SUSE openSUSE 11.1 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors related to "insufficient quoting of parameters." Vulnerabilidades de secuencias de comandos en sitios cruzados (XSS)en Apache Struts anteriores a v1.2.9-162.31.1 en SUSE Linux E... • http://download.opensuse.org/update/10.3-test/repodata/patch-struts-5872.xml • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 0

30 Mar 2006 — Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to bypass validation via a request with a 'org.apache.struts.taglib.html.Constants.CANCEL' parameter, which causes the action to be canceled but would not be detected from applications that do not use the isCancelled check. • http://issues.apache.org/bugzilla/show_bug.cgi?id=38374 •

CVSS: 7.8EPSS: 9%CPEs: 2EXPL: 1

30 Mar 2006 — ActionForm in Apache Software Foundation (ASF) Struts before 1.2.9 with BeanUtils 1.7 allows remote attackers to cause a denial of service via a multipart/form-data encoded form with a parameter name that references the public getMultipartRequestHandler method, which provides further access to elements in the CommonsMultipartRequestHandler implementation and BeanUtils. ActionForm in Apache Struts versions before 1.2.9 with BeanUtils 1.7 contains a vulnerability that allows for denial-of-service (DoS). • http://issues.apache.org/bugzilla/show_bug.cgi?id=38534 • CWE-749: Exposed Dangerous Method or Function •

CVSS: 4.3EPSS: 5%CPEs: 1EXPL: 0

30 Mar 2006 — Cross-site scripting (XSS) vulnerability in (1) LookupDispatchAction and possibly (2) DispatchAction and (3) ActionDispatcher in Apache Software Foundation (ASF) Struts before 1.2.9 allows remote attackers to inject arbitrary web script or HTML via the parameter name, which is not filtered in the resulting error message. • http://issues.apache.org/bugzilla/show_bug.cgi?id=38749 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •