Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts | 2.0.0 - 2.3.33 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | A simple script for exploit RCE for Struts 2 S2-053(CVE-2017-12611) | https://github.com/brianwrf/S2-053-CVE-2017-12611 | POC Details |
| 2 | Apache Struts 2.0.0 through 2.3.33 and 2.5 through 2.5.10.1 uses an unintentional expression in a Freemarker tag instead of string literals, which makes it susceptible to remote code execution attacks. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-12611.yaml | POC Details |
| 3 | None | https://github.com/tcetin704/CVE-2017-12611 | POC Details |
| 4 | RCE project | https://github.com/zeynepsilao/CVE-2017-12611_Exploit | POC Details |
No public POC found.
Login to generate AI POC| CVE-2016-6795 | Apache Struts 路径遍历漏洞 | |
| CVE-2016-8738 | Apache Struts 2 安全漏洞 | |
| CVE-2017-9793 | Apache Struts 输入验证错误漏洞 | |
| CVE-2017-9804 | Apache Struts 2 安全漏洞 |
No comments yet