jboss-seam2 is vulnerable to arbitrary code execution. The vulnerability exists as an input sanitization flaw was found in the way JBoss Seam processed certain parametrized JBoss Expression Language (EL) expressions. A remote attacker could use this flaw to execute arbitrary code via a URL, containing appended, specially-crafted expression language parameters, provided to certain applications based on the JBoss Seam framework.
archives.neohapsis.com/archives/bugtraq/2013-05/0117.html
www.redhat.com/security/updates/classification/#important
www.redhat.com/support/errata/RHSA-2010-0564.html
www.securityfocus.com/bid/41994
www.securitytracker.com/id?1024253
www.vupen.com/english/advisories/2010/1929
access.redhat.com/errata/RHSA-2010:0564
bugzilla.redhat.com/show_bug.cgi?id=615956
exchange.xforce.ibmcloud.com/vulnerabilities/60794
security.netapp.com/advisory/ntap-20161017-0001/