Vulnerability Description
Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2.5 Patch 12 and earlier, Ver 2.6 Patch 8 and earlier, Ver 2.7 Patch 6 and earlier, Ver 2.7 Government Edition Patch 7 and earlier, Ver 2.8 Patch 6 and earlier, Ver 2.8c Patch 5 and earlier, Ver 2.9 Patch 4 and earlier) allows remote attackers to execute EL expression on the server via unspecified vectors.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| D-Circle | Power Egg | 2.0.1 |
Related Weaknesses (CWE)
References
- http://jvn.jp/en/jp/JVN63860183/index.htmlThird Party Advisory
- https://poweregg.d-circle.com/support/package/important/20190204_000780/Vendor Advisory
- http://jvn.jp/en/jp/JVN63860183/index.htmlThird Party Advisory
- https://poweregg.d-circle.com/support/package/important/20190204_000780/Vendor Advisory
FAQ
What is CVE-2019-5916?
CVE-2019-5916 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Input validation issue in POWER EGG(Ver 2.0.1, Ver 2.02 Patch 3 and earlier, Ver 2.1 Patch 4 and earlier, Ver 2.2 Patch 7 and earlier, Ver 2.3 Patch 9 and earlier, Ver 2.4 Patch 13 and earlier, Ver 2....
How severe is CVE-2019-5916?
CVE-2019-5916 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2019-5916?
Check the references section above for vendor advisories and patch information. Affected products include: D-Circle Power Egg.