Vulnerabilities (CVE)

Filtered by vendor Apache Subscribe
Filtered by product Struts
Total 85 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2016-4431 1 Apache 1 Struts 2025-04-12 5.0 MEDIUM 7.5 HIGH
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks by leveraging a default method.
CVE-2016-3093 2 Apache, Ognl Project 2 Struts, Ognl 2025-04-12 5.0 MEDIUM 5.3 MEDIUM
Apache Struts 2.0.0 through 2.3.24.1 does not properly cache method references when used with OGNL before 3.0.12, which allows remote attackers to cause a denial of service (block access to a web site) via unspecified vectors.
CVE-2014-0112 1 Apache 1 Struts 2025-04-12 7.5 HIGH N/A
ParametersInterceptor in Apache Struts before 2.3.20 does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
CVE-2014-0113 1 Apache 1 Struts 2025-04-12 7.5 HIGH N/A
CookieInterceptor in Apache Struts before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0094.
CVE-2016-1181 2 Apache, Oracle 3 Struts, Banking Platform, Portal 2025-04-12 6.8 MEDIUM 8.1 HIGH
ActionServlet.java in Apache Struts 1 1.x through 1.3.10 mishandles multithreaded access to an ActionForm instance, which allows remote attackers to execute arbitrary code or cause a denial of service (unexpected memory access) via a multipart request, a related issue to CVE-2015-0899.
CVE-2016-4436 1 Apache 1 Struts 2025-04-12 7.5 HIGH 9.8 CRITICAL
Apache Struts 2 before 2.3.29 and 2.5.x before 2.5.1 allow attackers to have unspecified impact via vectors related to improper action name clean up.
CVE-2014-0094 1 Apache 1 Struts 2025-04-12 5.0 MEDIUM N/A
The ParametersInterceptor in Apache Struts before 2.3.16.2 allows remote attackers to "manipulate" the ClassLoader via the class parameter, which is passed to the getClass method.
CVE-2016-0785 1 Apache 1 Struts 2025-04-12 9.0 HIGH 8.8 HIGH
Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
CVE-2016-3082 1 Apache 1 Struts 2025-04-12 10.0 HIGH 9.8 CRITICAL
XSLTResult in Apache Struts 2.x before 2.3.20.2, 2.3.24.x before 2.3.24.2, and 2.3.28.x before 2.3.28.1 allows remote attackers to execute arbitrary code via the stylesheet location parameter.
CVE-2014-7809 1 Apache 1 Struts 2025-04-12 6.8 MEDIUM N/A
Apache Struts 2.0.0 through 2.3.x before 2.3.20 uses predictable <s:token/> values, which allows remote attackers to bypass the CSRF protection mechanism.
CVE-2016-4465 1 Apache 1 Struts 2025-04-12 5.0 MEDIUM 5.3 MEDIUM
The URLValidator class in Apache Struts 2 2.3.20 through 2.3.28.1 and 2.5.x before 2.5.1 allows remote attackers to cause a denial of service via a null value for a URL field.
CVE-2016-3081 2 Apache, Oracle 2 Struts, Siebel E-billing 2025-04-12 9.3 HIGH 8.1 HIGH
Apache Struts 2.3.19 to 2.3.20.2, 2.3.21 to 2.3.24.1, and 2.3.25 to 2.3.28, when Dynamic Method Invocation is enabled, allow remote attackers to execute arbitrary code via method: prefix, related to chained expressions.
CVE-2014-0116 1 Apache 1 Struts 2025-04-12 5.8 MEDIUM N/A
CookieInterceptor in Apache Struts 2.x before 2.3.20, when a wildcard cookiesName value is used, does not properly restrict access to the getClass method, which allows remote attackers to "manipulate" the ClassLoader and modify session state via a crafted request. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-0113.
CVE-2015-0899 1 Apache 1 Struts 2025-04-12 5.0 MEDIUM 7.5 HIGH
The MultiPageValidator implementation in Apache Struts 1 1.1 through 1.3.10 allows remote attackers to bypass intended access restrictions via a modified page parameter.
CVE-2016-4433 1 Apache 1 Struts 2025-04-12 5.0 MEDIUM 7.5 HIGH
Apache Struts 2 2.3.20 through 2.3.28.1 allows remote attackers to bypass intended access restrictions and conduct redirection attacks via a crafted request.
CVE-2016-4003 1 Apache 1 Struts 2025-04-12 4.3 MEDIUM 6.1 MEDIUM
Cross-site scripting (XSS) vulnerability in the URLDecoder function in JRE before 1.8, as used in Apache Struts 2.x before 2.3.28, when using a single byte page encoding, allows remote attackers to inject arbitrary web script or HTML via multi-byte characters in a url-encoded parameter.
CVE-2014-0114 1 Apache 2 Commons Beanutils, Struts 2025-04-12 7.5 HIGH N/A
Apache Commons BeanUtils, as distributed in lib/commons-beanutils-1.8.0.jar in Apache Struts 1.x through 1.3.10 and in other products requiring commons-beanutils through 1.9.2, does not suppress the class property, which allows remote attackers to "manipulate" the ClassLoader and execute arbitrary code via the class parameter, as demonstrated by the passing of this parameter to the getClass method of the ActionForm object in Struts 1.
CVE-2016-2162 1 Apache 1 Struts 2025-04-12 4.3 MEDIUM 6.1 MEDIUM
Apache Struts 2.x before 2.3.25 does not sanitize text in the Locale object constructed by I18NInterceptor, which might allow remote attackers to conduct cross-site scripting (XSS) attacks via unspecified vectors involving language display.
CVE-2012-0391 1 Apache 1 Struts 2025-04-11 9.3 HIGH 9.8 CRITICAL
The ExceptionDelegator component in Apache Struts before 2.2.3.1 interprets parameter values as OGNL expressions during certain exception handling for mismatched data types of properties, which allows remote attackers to execute arbitrary Java code via a crafted parameter.
CVE-2012-4386 1 Apache 1 Struts 2025-04-11 6.8 MEDIUM N/A
The token check mechanism in Apache Struts 2.0.0 through 2.3.4 does not properly validate the token name configuration parameter, which allows remote attackers to perform cross-site request forgery (CSRF) attacks by setting the token name configuration parameter to a session attribute.