Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2011-3923

Apache Struts before 2.3.1.2 allows remote attackers to bypass security protections in the ParameterInterceptor class and execute arbitrary commands.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.895
EPSS Ranking 99.5%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 7.5
Products affected by CVE-2011-3923
  • Apache » Struts » Version: 2.0.0
    cpe:2.3:a:apache:struts:2.0.0
  • Apache » Struts » Version: 2.0.1
    cpe:2.3:a:apache:struts:2.0.1
  • Apache » Struts » Version: 2.0.10
    cpe:2.3:a:apache:struts:2.0.10
  • Apache » Struts » Version: 2.0.11
    cpe:2.3:a:apache:struts:2.0.11
  • Apache » Struts » Version: 2.0.11.1
    cpe:2.3:a:apache:struts:2.0.11.1
  • Apache » Struts » Version: 2.0.11.2
    cpe:2.3:a:apache:struts:2.0.11.2
  • Apache » Struts » Version: 2.0.12
    cpe:2.3:a:apache:struts:2.0.12
  • Apache » Struts » Version: 2.0.13
    cpe:2.3:a:apache:struts:2.0.13
  • Apache » Struts » Version: 2.0.14
    cpe:2.3:a:apache:struts:2.0.14
  • Apache » Struts » Version: 2.0.2
    cpe:2.3:a:apache:struts:2.0.2
  • Apache » Struts » Version: 2.0.3
    cpe:2.3:a:apache:struts:2.0.3
  • Apache » Struts » Version: 2.0.4
    cpe:2.3:a:apache:struts:2.0.4
  • Apache » Struts » Version: 2.0.5
    cpe:2.3:a:apache:struts:2.0.5
  • Apache » Struts » Version: 2.0.6
    cpe:2.3:a:apache:struts:2.0.6
  • Apache » Struts » Version: 2.0.7
    cpe:2.3:a:apache:struts:2.0.7
  • Apache » Struts » Version: 2.0.8
    cpe:2.3:a:apache:struts:2.0.8
  • Apache » Struts » Version: 2.0.9
    cpe:2.3:a:apache:struts:2.0.9
  • Apache » Struts » Version: 2.1.0
    cpe:2.3:a:apache:struts:2.1.0
  • Apache » Struts » Version: 2.1.1
    cpe:2.3:a:apache:struts:2.1.1
  • Apache » Struts » Version: 2.1.2
    cpe:2.3:a:apache:struts:2.1.2
  • Apache » Struts » Version: 2.1.3
    cpe:2.3:a:apache:struts:2.1.3
  • Apache » Struts » Version: 2.1.4
    cpe:2.3:a:apache:struts:2.1.4
  • Apache » Struts » Version: 2.1.5
    cpe:2.3:a:apache:struts:2.1.5
  • Apache » Struts » Version: 2.1.6
    cpe:2.3:a:apache:struts:2.1.6
  • Apache » Struts » Version: 2.1.7
    cpe:2.3:a:apache:struts:2.1.7
  • Apache » Struts » Version: 2.1.8
    cpe:2.3:a:apache:struts:2.1.8
  • Apache » Struts » Version: 2.1.8.1
    cpe:2.3:a:apache:struts:2.1.8.1
  • Apache » Struts » Version: 2.2.1
    cpe:2.3:a:apache:struts:2.2.1
  • Apache » Struts » Version: 2.2.1.1
    cpe:2.3:a:apache:struts:2.2.1.1
  • Apache » Struts » Version: 2.2.3
    cpe:2.3:a:apache:struts:2.2.3
  • Apache » Struts » Version: 2.2.3.1
    cpe:2.3:a:apache:struts:2.2.3.1
  • Apache » Struts » Version: 2.3.0
    cpe:2.3:a:apache:struts:2.3.0
  • Apache » Struts » Version: 2.3.1
    cpe:2.3:a:apache:struts:2.3.1
  • Apache » Struts » Version: 2.3.1.1
    cpe:2.3:a:apache:struts:2.3.1.1
  • Redhat » Jboss Enterprise Web Server » Version: 1.0.0
    cpe:2.3:a:redhat:jboss_enterprise_web_server:1.0.0


Contact Us

Shodan ® - All rights reserved