JBoss Seam 2 (jboss-seam2), as used in JBoss Enterprise Application Platform 4.3.0 for Red Hat Linux, does not properly sanitize inputs for JBoss Expression Language (EL) expressions, which allows remote attackers to execute arbitrary code via a crafted URL. NOTE: this is only a vulnerability when the Java Security Manager is not properly configured.
https://security.netapp.com/advisory/ntap-20161017-0001/
https://exchange.xforce.ibmcloud.com/vulnerabilities/60794
https://bugzilla.redhat.com/show_bug.cgi?id=615956
http://www.vupen.com/english/advisories/2010/1929
http://www.securitytracker.com/id?1024253
http://www.securityfocus.com/bid/41994
http://www.redhat.com/support/errata/RHSA-2010-0564.html
http://archives.neohapsis.com/archives/bugtraq/2013-05/0117.html