Loading...
Loading...
Apache Struts 2 before 2.3.14.3 allows remote attackers to execute arbitrary OGNL code via a request with a crafted value that contains both "${}" and "%{}" sequences, which causes the OGNL code to be evaluated twice.
July 16, 2013
April 29, 2026
See which npm, PyPI, Go, and Maven packages are affected by CVE-2013-2135
EchelonGraph automatically scans your cloud infrastructure and maps CVE exposure using blast radius analysis.