<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Struts2 CVE-2017-5638 in Network Access Control</title>
    <link>https://community.cisco.com/t5/network-access-control/struts2-cve-2017-5638/m-p/3548809#M517060</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, not needed. The CVE is associated with CSCvd49829 and the fix has been integrated into 2.2 Patch 1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Mon, 14 May 2018 19:51:09 GMT</pubDate>
    <dc:creator>hslai</dc:creator>
    <dc:date>2018-05-14T19:51:09Z</dc:date>
    <item>
      <title>Struts2 CVE-2017-5638</title>
      <link>https://community.cisco.com/t5/network-access-control/struts2-cve-2017-5638/m-p/3548808#M517057</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I'm going to patch 8 in several months. Does &lt;STRONG&gt;2.2.0.470 with Patch 8&lt;/STRONG&gt; deployment still need Struts2 CVE-2017-5638 fix, aka "&lt;SPAN class="pointer text-darkgreen"&gt;ise-applystrutsfix-signed.x86_64.tar.gz"&lt;/SPAN&gt;?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2018 19:44:39 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/struts2-cve-2017-5638/m-p/3548808#M517057</guid>
      <dc:creator>Ping Zhou</dc:creator>
      <dc:date>2018-05-14T19:44:39Z</dc:date>
    </item>
    <item>
      <title>Re: Struts2 CVE-2017-5638</title>
      <link>https://community.cisco.com/t5/network-access-control/struts2-cve-2017-5638/m-p/3548809#M517060</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;No, not needed. The CVE is associated with CSCvd49829 and the fix has been integrated into 2.2 Patch 1.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 14 May 2018 19:51:09 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-access-control/struts2-cve-2017-5638/m-p/3548809#M517060</guid>
      <dc:creator>hslai</dc:creator>
      <dc:date>2018-05-14T19:51:09Z</dc:date>
    </item>
  </channel>
</rss>

