Vulnerabilities > Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2019-02-13 | CVE-2019-5916 | Expression Language Injection vulnerability in D-Circle Power EGG Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2.5 Patch 12 and earlier, Ver 2.6 Patch 8 and earlier, Ver 2.7 Patch 6 and earlier, Ver 2.7 Government Edition Patch 7 and earlier, Ver 2.8 Patch 6 and earlier, Ver 2.8c Patch 5 and earlier, Ver 2.9 Patch 4 and earlier) allows remote attackers to execute EL expression on the server via unspecified vectors. | 9.8 |
2019-02-12 | CVE-2019-7743 | Expression Language Injection vulnerability in Joomla Joomla! An issue was discovered in Joomla! before 3.9.3. | 9.8 |
2018-11-15 | CVE-2018-16621 | Expression Language Injection vulnerability in Sonatype Nexus Repository Manager Sonatype Nexus Repository Manager before 3.14 allows Java Expression Language Injection. | 7.2 |
2018-06-18 | CVE-2018-12533 | Expression Language Injection vulnerability in Redhat Richfaces JBoss RichFaces 3.1.0 through 3.3.4 allows unauthenticated remote attackers to inject expression language (EL) expressions and execute arbitrary Java code via a /DATA/ substring in a path with an org.richfaces.renderkit.html.Paint2DResource$ImageData object, aka RF-14310. | 9.8 |
2018-06-18 | CVE-2018-12532 | Expression Language Injection vulnerability in Redhat Richfaces JBoss RichFaces 4.5.3 through 4.5.17 allows unauthenticated remote attackers to inject an arbitrary expression language (EL) variable mapper and execute arbitrary Java code via a MediaOutputResource's resource request, aka RF-14309. | 9.8 |
2010-08-05 | CVE-2010-1871 | Expression Language Injection vulnerability in multiple products JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. | 8.8 |