9.8
CVE-2016-1114
- EPSS 2.34%
- Veröffentlicht 11.05.2016 01:59:43
- Zuletzt bearbeitet 12.04.2025 10:46:40
- Quelle psirt@adobe.com
- CVE-Watchlists
- Unerledigt
Adobe ColdFusion 10 before Update 19, 11 before Update 8, and 2016 before Update 1 allows remote attackers to execute arbitrary commands via a crafted serialized Java object, related to the Apache Commons Collections library.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Adobe ≫ Coldfusion Version10.0 Update-
Adobe ≫ Coldfusion Version10.0 Updateupdate1
Adobe ≫ Coldfusion Version10.0 Updateupdate10
Adobe ≫ Coldfusion Version10.0 Updateupdate11
Adobe ≫ Coldfusion Version10.0 Updateupdate12
Adobe ≫ Coldfusion Version10.0 Updateupdate13
Adobe ≫ Coldfusion Version10.0 Updateupdate14
Adobe ≫ Coldfusion Version10.0 Updateupdate15
Adobe ≫ Coldfusion Version10.0 Updateupdate16
Adobe ≫ Coldfusion Version10.0 Updateupdate17
Adobe ≫ Coldfusion Version10.0 Updateupdate18
Adobe ≫ Coldfusion Version10.0 Updateupdate2
Adobe ≫ Coldfusion Version10.0 Updateupdate3
Adobe ≫ Coldfusion Version10.0 Updateupdate4
Adobe ≫ Coldfusion Version10.0 Updateupdate5
Adobe ≫ Coldfusion Version10.0 Updateupdate6
Adobe ≫ Coldfusion Version10.0 Updateupdate7
Adobe ≫ Coldfusion Version10.0 Updateupdate8
Adobe ≫ Coldfusion Version10.0 Updateupdate9
Adobe ≫ Coldfusion Version11.0 Update-
Adobe ≫ Coldfusion Version11.0 Updateupdate1
Adobe ≫ Coldfusion Version11.0 Updateupdate2
Adobe ≫ Coldfusion Version11.0 Updateupdate3
Adobe ≫ Coldfusion Version11.0 Updateupdate4
Adobe ≫ Coldfusion Version11.0 Updateupdate5
Adobe ≫ Coldfusion Version11.0 Updateupdate6
Adobe ≫ Coldfusion Version11.0 Updateupdate7
Adobe ≫ Coldfusion Version2016 Update-
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 2.34% | 0.834 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 9.8 | 3.9 | 5.9 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
| nvd@nist.gov | 7.5 | 10 | 6.4 |
AV:N/AC:L/Au:N/C:P/I:P/A:P
|
CWE-502 Deserialization of Untrusted Data
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.