Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Struts | 2.1.x series | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Apache struts struts 2 048, CVE-2017-9791. | https://github.com/IanSmith123/s2-048 | POC Details |
| 2 | CVE-2017-9791 | https://github.com/dragoneeg/Struts2-048 | POC Details |
| 3 | Metasploit module for Apache Struts CVE-2017-9791 Remote Code Execution Vulnerability | https://github.com/xfer0/CVE-2017-9791 | POC Details |
| 4 | Apache Struts 2.1.x and 2.3.x with the Struts 1 plugin might allow remote code execution via a malicious field value passed in a raw message to the ActionMessage. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2017/CVE-2017-9791.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2017-7670 | Apache Traffic Control 安全漏洞 | |
| CVE-2017-5640 | Apache Impala 安全漏洞 | |
| CVE-2017-5652 | Apache Impala 安全漏洞 |
No comments yet