Apache Struts 2.x before 2.3.28 allows remote attackers to execute arbitrary code via a "%{}" sequence in a tag attribute, aka forced double OGNL evaluation.
{ "versions": [ { "introduced": "2.0.0" }, { "fixed": "2.3.20.3" }, { "introduced": "2.3.21" }, { "last_affected": "2.3.24.1" } ] }
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0785.json"