Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2013-4316 (GCVE-0-2013-4316)
Vulnerability from cvelistv5 – Published: 2013-09-30 21:00 – Updated: 2024-08-06 16:38- n/a
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T16:38:01.887Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"name": "64758",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "1029078",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1029078"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2013-09-21T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2014-01-16T01:57:02.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"name": "64758",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "1029078",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1029078"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4316",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"name": "http://struts.apache.org/release/2.3.x/docs/s2-019.html",
"refsource": "CONFIRM",
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "1029078",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029078"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2013-4316",
"datePublished": "2013-09-30T21:00:00.000Z",
"dateReserved": "2013-06-12T00:00:00.000Z",
"dateUpdated": "2024-08-06T16:38:01.887Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CERTA-2014-AVI-022
Vulnerability from certfr_avis - Published: 2014-01-15 - Updated: 2014-01-15
De multiples vulnérabilités ont été corrigées dans Oracle Fusion Middleware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un contournement de la politique de sécurité et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Oracle Fusion Middleware versions 12.1.2.0 et antérieures
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eOracle Fusion Middleware versions 12.1.2.0 et ant\u00e9rieures\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0383",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0383"
},
{
"name": "CVE-2013-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1620"
},
{
"name": "CVE-2013-1654",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1654"
},
{
"name": "CVE-2007-1858",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1858"
},
{
"name": "CVE-2014-0400",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0400"
},
{
"name": "CVE-2013-5785",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5785"
},
{
"name": "CVE-2007-0009",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-0009"
},
{
"name": "CVE-2013-5901",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5901"
},
{
"name": "CVE-2013-5808",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5808"
},
{
"name": "CVE-2014-0374",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0374"
},
{
"name": "CVE-2012-3499",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3499"
},
{
"name": "CVE-2013-5879",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5879"
},
{
"name": "CVE-2013-1862",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1862"
},
{
"name": "CVE-2012-4605",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4605"
},
{
"name": "CVE-2013-4316",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4316"
},
{
"name": "CVE-2012-3544",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3544"
},
{
"name": "CVE-2013-5869",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5869"
},
{
"name": "CVE-2013-5900",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5900"
},
{
"name": "CVE-2014-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0391"
}
],
"initial_release_date": "2014-01-15T00:00:00",
"last_revision_date": "2014-01-15T00:00:00",
"links": [],
"reference": "CERTA-2014-AVI-022",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle Fusion Middleware\u003c/span\u003e. Certaines d\u0027entre elles\npermettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire\n\u00e0 distance, un contournement de la politique de s\u00e9curit\u00e9 et une atteinte\n\u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle Fusion Middleware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}
CERTA-2014-AVI-033
Vulnerability from certfr_avis - Published: 2014-01-15 - Updated: 2014-01-15
De multiples vulnérabilités ont été corrigées dans Oracle MySql. Elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à l'intégrité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle MySQL versions 3.0.4 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL versions 2.3.14 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle MySQL versions 5.6.14 et ant\u00e9rieures",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2014-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0437"
},
{
"name": "CVE-2014-0431",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0431"
},
{
"name": "CVE-2014-0427",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0427"
},
{
"name": "CVE-2013-5894",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5894"
},
{
"name": "CVE-2014-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0433"
},
{
"name": "CVE-2014-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0401"
},
{
"name": "CVE-2013-5860",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5860"
},
{
"name": "CVE-2014-0386",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0386"
},
{
"name": "CVE-2013-5882",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5882"
},
{
"name": "CVE-2014-0393",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0393"
},
{
"name": "CVE-2014-0420",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0420"
},
{
"name": "CVE-2014-0412",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0412"
},
{
"name": "CVE-2014-0402",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0402"
},
{
"name": "CVE-2014-0430",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0430"
},
{
"name": "CVE-2013-5881",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5881"
},
{
"name": "CVE-2013-5891",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5891"
},
{
"name": "CVE-2013-4316",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4316"
},
{
"name": "CVE-2013-5908",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5908"
}
],
"initial_release_date": "2014-01-15T00:00:00",
"last_revision_date": "2014-01-15T00:00:00",
"links": [],
"reference": "CERTA-2014-AVI-033",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eOracle MySql\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de\nservice \u00e0 distance et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySql",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}
CERTA-2013-AVI-596
Vulnerability from certfr_avis - Published: 2013-10-21 - Updated: 2013-10-21
De multiples vulnérabilités ont été corrigées dans Apache Struts. Elles permettent à un attaquant de provoquer un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Apache Struts 2.0.0 à 2.3.15.2
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eApache Struts 2.0.0 \u00e0 2.3.15.2\u003c/P\u003e",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4310",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4310"
},
{
"name": "CVE-2013-4316",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4316"
}
],
"initial_release_date": "2013-10-21T00:00:00",
"last_revision_date": "2013-10-21T00:00:00",
"links": [],
"reference": "CERTA-2013-AVI-596",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2013-10-21T00:00:00.000000"
}
],
"risks": [
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans \u003cspan\nclass=\"textit\"\u003eApache Struts\u003c/span\u003e. Elles permettent \u00e0 un attaquant de\nprovoquer un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Apache Struts",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache s2-018 du 19 septembre 2013",
"url": "http://struts.apache.org/release/2.3.x/docs/s2-018.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Apache s2-019 du 19 septembre 2013",
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
}
]
}
CERTA-2014-AVI-029
Vulnerability from certfr_avis - Published: 2014-01-15 - Updated: 2014-01-15
Une vulnérabilité a été corrigée dans Oracle Financial Services Software. Elle permet à un attaquant de provoquer une exécution de code arbitraire à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Oracle Financial Services Software versions 12.0.2 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Financial Services Software versions 2.2.0.1 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "Oracle Financial Services Software version 1.7",
"product": {
"name": "N/A",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2013-4316",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4316"
}
],
"initial_release_date": "2014-01-15T00:00:00",
"last_revision_date": "2014-01-15T00:00:00",
"links": [],
"reference": "CERTA-2014-AVI-029",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2014-01-15T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 a \u00e9t\u00e9 corrig\u00e9e dans \u003cspan class=\"textit\"\u003eOracle\nFinancial Services Software\u003c/span\u003e. Elle permet \u00e0 un attaquant de\nprovoquer une ex\u00e9cution de code arbitraire \u00e0 distance.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Oracle Financial Services Software",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Oracle cpujan2014 du 14 janvier 2014",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}
CVE-2013-4316
Vulnerability from fstec - Published: 09.09.2013{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Oracle Corp., IBM Corp., Apache Software Foundation",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11.1.1.8.0 (WebCenter Sites), 2.2.0.1 (Oracle FLEXCUBE Private Banking), 12.0.1.0 (Oracle FLEXCUBE Private Banking), 11.1.1.6.1 (WebCenter Sites), 1.7 (Oracle FLEXCUBE Private Banking), 2.0 (Oracle FLEXCUBE Private Banking), 2.0.1 (Oracle FLEXCUBE Private Banking), 3.0 (Oracle FLEXCUBE Private Banking), 12.0.2 (Oracle FLEXCUBE Private Banking), \u0434\u043e 2.3.14 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), \u043e\u0442 3.0.0 \u0434\u043e 3.0.4 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (MySQL Enterprise Monitor), 9.5.0 (IBM Call Center for Commerce), 10.0 (IBM Call Center for Commerce), \u043e\u0442 2.0.0 \u0434\u043e 2.3.15.1 \u0432\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e (Struts)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f Apache Struts:\nhttps://cwiki.apache.org/confluence/display/WW/S2-019\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 IBM:\nhttps://www.ibm.com/blogs/psirt/security-bulletin-ibm-call-center-and-apache-struts-struts-upgrade-strategy-various-cves-see-below/\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Oracle:\nhttps://www.oracle.com/security-alerts/cpujan2014.html\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n\u0421\u043b\u0435\u0434\u0443\u0435\u0442 \u043e\u0442\u043a\u043b\u044e\u0447\u0438\u0442\u044c \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c Dynamic Method Invocation (DMI):\n\u003cconstant name=\"struts.enable.DynamicMethodInvocation\" value=\"false\"/\u003e",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "09.09.2013",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "04.10.2022",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "04.10.2022",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2022-06073",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2013-4316",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "WebCenter Sites, Oracle FLEXCUBE Private Banking, MySQL Enterprise Monitor, IBM Call Center for Commerce, Struts",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 Dynamic Method Invocation (DMI) \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Apache Struts, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u044f (CWE-16), \u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043c\u0435\u0445\u0430\u043d\u0438\u0437\u043c\u0430 Dynamic Method Invocation (DMI) \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b Apache Struts \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-call-center-and-apache-struts-struts-upgrade-strategy-various-cves-see-below/\nhttps://cwiki.apache.org/confluence/display/WW/S2-019\nhttps://www.oracle.com/security-alerts/cpujan2014.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2013-4316",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e \u0437\u0430\u0449\u0438\u0442\u044b, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-16, CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
GHSA-J7H6-XR7G-M2C5
Vulnerability from github – Published: 2022-05-17 03:28 – Updated: 2023-08-16 09:36Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.struts:struts2-core"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.3.15.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "org.apache.struts:struts2-rest-plugin"
},
"ranges": [
{
"events": [
{
"introduced": "2.0.0"
},
{
"fixed": "2.3.15.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2013-4316"
],
"database_specific": {
"cwe_ids": [
"CWE-94"
],
"github_reviewed": true,
"github_reviewed_at": "2022-11-03T22:43:48Z",
"nvd_published_at": "2013-09-30T21:55:00Z",
"severity": "HIGH"
},
"details": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.",
"id": "GHSA-j7h6-xr7g-m2c5",
"modified": "2023-08-16T09:36:55Z",
"published": "2022-05-17T03:28:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2013-4316"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/58947c3f85ae641c1a476316a2888e53605948d1"
},
{
"type": "WEB",
"url": "https://github.com/apache/struts/commit/c643336945dda84cbcdc8a39530baa24fede28c4"
},
{
"type": "PACKAGE",
"url": "https://github.com/apache/struts"
},
{
"type": "WEB",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"type": "WEB",
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
}
],
"schema_version": "1.4.0",
"severity": [],
"summary": "Code injection in Apache Struts"
}
FKIE_CVE-2013-4316
Vulnerability from fkie_nvd - Published: 2013-09-30 21:55 - Updated: 2025-04-11 00:51{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5CF11DCF-6F6E-4E18-988E-E43918FBB8A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE3A90B7-C632-4D3E-9A4F-21E46D273B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "386538BE-F258-4870-8E11-750ADA228026",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "B4CF15B9-3714-4206-9971-1F7D59E20483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "DFA32D87-65C7-4589-86B7-500BE3203CFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "98C3FB11-4E24-4067-A3A9-021F849DAAE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "4DCF2D72-90F1-4D1B-94A2-5BB3D8C086C2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "661F1610-9FCD-4FC1-BCA1-69C58E0A1389",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "D9C89E22-B106-4EAB-90A1-0EA86C165737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "6E1BABB2-780E-47E0-87A9-A164906C8421",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "AC32348E-7EF4-411C-9A44-CD041ABFA0E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "94BD452B-AE41-4F7A-9DB9-4B1039582537",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ACFDC53B-7B8E-4333-BC87-E01024EC9C21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9F0818E7-B617-4C30-BFAC-9FE2F375F8BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "50F4A58E-F3D4-4711-A37E-EA538B112371",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "EFFCC96F-FD87-4495-B8A5-19D7898D5662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "DEA0424E-84B4-41BD-8E6C-93E2A77DD6CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CEC53AE5-3640-4FE1-B0B1-EA26C5B9EB9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "662A2E4B-A76A-4498-98A6-F90DF65C62B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "4E720B3A-4CFB-47FE-B80C-67C59D4C7FD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CA687B56-A09B-4741-84F1-2BD9569A3F76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "0BC0E358-8B4D-480B-BFAE-966CB697310A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "2B7E8E1C-C667-4AED-86A5-2BD0C62AAD76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "88B3348C-1086-4A16-97E3-52DB65FF860A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*",
"matchCriteriaId": "3C65711D-9C5B-4644-A12D-82243CB6FB1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FC1FA9A7-2C8E-4651-9400-190198528642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FA9093C0-AE6A-4285-B159-8FDBF37E33D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "267A1C33-1C95-41DA-8A01-6F20C7BE1772",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7E4590B9-6A44-4DC6-B7DF-5E6CAAA9D25A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "30860683-D403-4D24-B356-FD306AEFCA46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4E3316DA-9E34-4955-91CA-E35B141A7007",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0D152B29-FAD5-4DEA-B187-278EBD37FEB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "2AC68463-F500-471C-8600-8F8FD9743B12",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A92AAE08-4811-465A-8178-25F5F349B8BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B487975D-6394-4136-B45C-C1F209465B24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BDC41957-8CCA-46A6-BD31-4039EEF3C457",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "443B4E64-2A36-49C6-B09D-77B3BDF69709",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2481505C-4FD1-4195-9E10-9DD741498FB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "28ED63DB-2AAF-4BC9-A844-074EDF63C89A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "38A6CEED-6C43-4325-B36C-9F254CCDFDC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*",
"matchCriteriaId": "41F43088-26AA-4890-A9D6-1B9B48D5F02A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BE6820E3-8FDF-4BDF-8B62-E604A91F1280",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*",
"matchCriteriaId": "D25ED06A-F12C-443E-9B3F-FDDF52FE9D93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "44527919-8403-42A8-9CE1-3B4F58630F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EBB91D8A-14B8-4263-B90D-F776535F9B8F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:1.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7604257C-19FC-442E-B57F-632437AC55FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "0A6A6590-D8F5-4DB8-BE77-D0FC9B29E183",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0CCECB33-4CA3-4519-A733-3529B70AB9BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:2.2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5104F0A-CD23-4A6E-AD59-B6F5A949B006",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7D2673F9-7908-45AA-8A06-3D1D15073EB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "11CCF1EE-70D3-40C9-9797-AE6228DA8522",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E00A28FF-FE53-487A-BB20-70EBDF50EB3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "D814C515-A146-4A83-B0B7-FCEF7221D57A",
"versionEndIncluding": "2.3.14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C1B1D477-792A-4443-96F1-43310C464152",
"versionEndIncluding": "3.0.4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:webcenter_sites:11.1.1.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "743086BB-8F3E-4D6C-9050-F736478D8FCF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1BB4709C-6373-43CC-918C-876A6569865A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors."
},
{
"lang": "es",
"value": "Apache Struts 2.0.0 hasta la versi\u00f3n 2.3.15.1 habilita por defecto Dynamic Method Invocation, lo cual tiene un impacto y vectores de ataque desconocidos."
}
],
"id": "CVE-2013-4316",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2013-09-30T21:55:09.630",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Patch"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029078"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029078"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
},
{
"lang": "en",
"value": "CWE-284"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GSD-2013-4316
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2013-4316",
"description": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.",
"id": "GSD-2013-4316",
"references": [
"https://www.suse.com/security/cve/CVE-2013-4316.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2013-4316"
],
"details": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.",
"id": "GSD-2013-4316",
"modified": "2023-12-13T01:22:16.889131Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4316",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix",
"refsource": "BUGTRAQ",
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"name": "http://struts.apache.org/release/2.3.x/docs/s2-019.html",
"refsource": "CONFIRM",
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"name": "64758",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
},
{
"name": "1029078",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1029078"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "[2-alpha0,2.3.15.1]",
"affected_versions": "All versions starting from 2-alpha0 up to 2.3.15.1",
"cvss_v2": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"cwe_ids": [
"CWE-1035",
"CWE-16",
"CWE-284",
"CWE-937"
],
"date": "2016-12-07",
"description": "This package enables Dynamic Method Invocation by default, which has unknown impact and attack vectors.",
"fixed_versions": [
"2.3.15.2"
],
"identifier": "CVE-2013-4316",
"identifiers": [
"CVE-2013-4316"
],
"not_impacted": "All versions before 2-alpha0, all versions after 2.3.15.1",
"package_slug": "maven/org.apache.struts/struts2-core",
"pubdate": "2013-09-30",
"solution": "Upgrade to version 2.3.15.2 or above.",
"title": "Dynamic Method Invocation",
"urls": [
"http://struts.apache.org/docs/s2-019.html",
"https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-4316"
],
"uuid": "d526fc68-20af-4a7d-9a34-ecc2be75656a"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.15.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.11.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.11.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:apache:struts:2.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:oracle:webcenter_sites:11.1.1.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:1.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.0.4",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:2.2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.3.14",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:webcenter_sites:11.1.1.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:12.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:oracle:flexcube_private_banking:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2013-4316"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Apache Struts 2.0.0 through 2.3.15.1 enables Dynamic Method Invocation by default, which has unknown impact and attack vectors."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-16"
},
{
"lang": "en",
"value": "NVD-CWE-noinfo"
},
{
"lang": "en",
"value": "CWE-284"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20130921 [ANN] Struts 2.3.15.2 GA release available - security fix",
"refsource": "BUGTRAQ",
"tags": [
"Patch"
],
"url": "http://archives.neohapsis.com/archives/bugtraq/2013-09/0107.html"
},
{
"name": "http://struts.apache.org/release/2.3.x/docs/s2-019.html",
"refsource": "CONFIRM",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "http://struts.apache.org/release/2.3.x/docs/s2-019.html"
},
{
"name": "1029078",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1029078"
},
{
"name": "64758",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/64758"
},
{
"name": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html",
"refsource": "CONFIRM",
"tags": [
"Third Party Advisory"
],
"url": "http://www.oracle.com/technetwork/topics/security/cpujan2014-1972949.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2016-12-07T17:34Z",
"publishedDate": "2013-09-30T21:55Z"
}
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.