9.8

CVE-2019-5916

Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2.5 Patch 12 and earlier, Ver 2.6 Patch 8 and earlier, Ver 2.7 Patch 6 and earlier, Ver 2.7 Government Edition Patch 7 and earlier, Ver 2.8 Patch 6 and earlier, Ver 2.8c Patch 5 and earlier, Ver 2.9 Patch 4 and earlier) allows remote attackers to execute EL expression on the server via unspecified vectors.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
D-circlePower Egg Version2.0.1
D-circlePower Egg Version2.0.2 Updatepatch3
D-circlePower Egg Version2.1 Updatepatch4
D-circlePower Egg Version2.2 Updatepatch7
D-circlePower Egg Version2.3 Updatepatch9
D-circlePower Egg Version2.4 Updatepatch13
D-circlePower Egg Version2.5 Updatepatch12
D-circlePower Egg Version2.6 Updatepatch8
D-circlePower Egg Version2.7 Updatepatch6
D-circlePower Egg Version2.7 Updatepatch7 SwEditiongovernment
D-circlePower Egg Version2.8 Updatepatch6
D-circlePower Egg Version2.8c Updatepatch5
D-circlePower Egg Version2.9 Updatepatch4
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.87% 0.73
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 9.8 3.9 5.9
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 7.5 10 6.4
AV:N/AC:L/Au:N/C:P/I:P/A:P
CWE-917 Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')

The product constructs all or part of an expression language (EL) statement in a framework such as a Java Server Page (JSP) using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended EL statement before it is executed.