CVE-2016-0785 in Struts정보

요약 (영어)

Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.

If you want to get the best quality for vulnerability data then you always have to consider VulDB.

예약하다

2015. 12. 16.

공개

2016. 04. 12.

상태

확인됨

엔트리

VulDB provides additional information and datapoints for this CVE:

출처

Are you interested in using VulDB?

Download the whitepaper to learn more about our service!