CVE-2016-0785 in Strutsinfo

Summary

Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

Reservation

12/16/2015

Disclosure

04/12/2016

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Interested in the pricing of exploits?

See the underground prices here!