From 4a22b0225b724fe446e5f1320fb496a9582cb61a Mon Sep 17 00:00:00 2001 From: Geeknik Labs <466878+geeknik@users.noreply.github.com> Date: Thu, 18 Mar 2021 16:10:11 +0000 Subject: [PATCH] Update CVE-2019-0230.yaml --- cves/2019/CVE-2019-0230.yaml | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/cves/2019/CVE-2019-0230.yaml b/cves/2019/CVE-2019-0230.yaml index ec59d39e95..0c52c1b430 100644 --- a/cves/2019/CVE-2019-0230.yaml +++ b/cves/2019/CVE-2019-0230.yaml @@ -4,7 +4,7 @@ info: name: Apache Struts RCE author: geeknik description: Apache Struts 2.0.0 to 2.5.20 forced double OGNL evaluation, when evaluated on raw user input in tag attributes, may lead to remote code execution. - reference: + reference: - https://cwiki.apache.org/confluence/display/WW/S2-059 - https://www.tenable.com/blog/cve-2019-0230-apache-struts-potential-remote-code-execution-vulnerability severity: high