{"uuid": "002f9111-6a09-46ee-8a18-10faf986eb2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-53677", "type": "exploited", "source": "https://t.me/thehackernews/6060", "content": "\ud83d\udd25 A critical Apache Struts vulnerability (CVE-2024-53677) with a 9.5/10 CVSS score is actively being exploited, putting corporate IT stacks at risk. \n \n\u00bb Hackers are uploading malicious files, enabling remote code execution. \n\u00bb Systems running Struts versions 2.0.0 to 6.3.0.2 are vulnerable. \n \n\ud83d\udc49 Don\u2019t be tomorrow\u2019s headline. Upgrade to Struts 6.4.0+ and adopt the Action File Upload mechanism NOW to stay secure. \n \nFind details here: https://thehackernews.com/2024/12/patch-alert-critical-apache-struts-flaw.html", "creation_timestamp": "2024-12-18T06:11:50.000000Z"}