CVE-2016-0785
12.04.2016, 16:59
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.Enginsight
Vendor | Product | Version |
---|---|---|
apache | struts | 2.0.0 ≤ 𝑥 < 2.3.20.3 |
apache | struts | 2.3.21 ≤ 𝑥 ≤ 2.3.24.1 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration