![]() ![]() Successful exploitation could lead to arbitrary code execution.ĬoldFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a command injection vulnerability. Please note that some of the information in the bulletin is compiled from external, open-source reports and is not a direct result of CISA analysis.ĬoldFusion versions Update 3 and earlier, Update 10 and earlier, and Update 18 and earlier have a file extension blacklist bypass vulnerability. Patch information is provided when available. This information may include identifying information, values, definitions, and related links.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |