Page 2 of 24 results (0.001 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

An example application in ColdFusion Server 4.0 allows remote attackers to view source code via the sourcewindow.cfm file. • http://www.allaire.com/handlers/index.cfm?ID=8739&Method=Full •

CVSS: 5.0EPSS: 2%CPEs: 1EXPL: 2

The GetFile.cfm file in Allaire Forums allows remote attackers to read files through a parameter to GetFile.cfm. • https://www.exploit-db.com/exploits/19193 http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00332.html http://www.allaire.com/handlers/index.cfm?ID=9602&Method=Full http://www.osvdb.org/944 https://exchange.xforce.ibmcloud.com/vulnerabilities/1748 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The Syntax Checker in ColdFusion Server 4.0 allows remote attackers to conduct a denial of service. • http://www.allaire.com/handlers/index.cfm?ID=8739&Method=Full http://www.osvdb.org/3236 https://exchange.xforce.ibmcloud.com/vulnerabilities/1742 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

The ColdFusion CFCRYPT program for encrypting CFML templates has weak encryption, allowing attackers to decrypt the templates. • https://www.exploit-db.com/exploits/19220 http://www.allaire.com/handlers/index.cfm?ID=10969&Method=Full https://exchange.xforce.ibmcloud.com/vulnerabilities/2208 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Sample runnable code snippets in ColdFusion Server 4.0 allow remote attackers to read files, conduct a denial of service, or use the server as a proxy for other HTTP calls. • http://www.allaire.com/handlers/index.cfm?ID=8739&Method=Full •