Sunday, February 21, 23:25
Home security Adobe: ColdFusion platform release update to release critical vulnerabilities

Adobe: ColdFusion platform release update to release critical vulnerabilities

AdobeRecently presented three vulnerabilities on Adobe's ColdFusion platform. The company immediately released one update to address vulnerabilities. One of them was even considered particularly critical.

Adobe has stated that vulnerabilities affect it ColdFusion 2016 and 2018.

The updated version released on Tuesday, September 24. The company has made the necessary corrections to prevent possible malware code, the bypass control access and leaks data.

The first vulnerability, the one that has been characterized as critical, has been named CVE-2019-8073. That particular error security can allow hackers to execute malicious code.

The update also resolves a second vulnerability, known as CVE-2019-8074, which is characterized as path traversal vulnerability. Attackers can take advantage of this vulnerability to bypass access control systems. If they manage to bypass the controls, hackers will be able to do various things, such as execute malicious code.

The third vulnerability is called CVE-2019-8072. Vulnerability also allows for bypassing her security and the theft of personal information.

The vulnerabilities were discovered by foundeo researchers and Knownsec 404. Adobe made sure to thank them researchers.

Adobe advises users of the ColdFusion platform to install the new update as quickly as possible. ColdFusion 2016 users will need to install it Update 12, while users of ColdFusion 2018 should use Update 5.

Adobe is not the only company to release updates this week. THE Microsoft also issued an emergency update to resolve critical security errors. The first vulnerability is known as CVE-2019-1367, located on the Internet Explore and allows remote code execution. The second vulnerability, CVE-2019-1255, is a denial-of-service error in the antivirus service, Microsoft Defender. The second vulnerability is less serious, because to be used, hackers must first access the system.


Please enter your comment!
Please enter your name here

Absent Mia
Absent Mia
Being your self, in a world that constantly tries to change you, is your greatest achievement


How to make a Facetime Audio call

Tired of low quality cell phone calls? Thanks to FaceTime, you can make high-resolution calls if you use iPhone, iPad, ...

How to add special effects to Instagram messages

Did you know that you can make instant Instagram messages more impressive? Like any other Instagram feature, you can add special ...

Only 270 addresses are responsible for 55% of all money laundering

Cybercriminals who keep their money in cryptocurrencies tend to "launder" money through a small set of online services, according to ...

Twitter: Voice messages are coming! How do we send them?

Twitter will soon support voice messages in both iOS and Android applications. This means that you will be able to send ...

How to connect a Bluetooth headset to a Nintendo Switch

The Nintendo Switch has a headphone jack. However, most headphones have become wireless so you will need a way to connect them ...

How to hide your phone number in Telegram

If you wish to create a Telegram account, you must provide your telephone number. In this way, Telegram validates the ...

Google Assistant: How can you delete your recordings?

Google Assistant can make your daily life much easier. However, it also involves some privacy issues, as ...

Microsoft: Office 2021 / Office LTSC coming in the second half of 2021

Microsoft announced that the Microsoft Office Long Term Service Channel (LTSC) and Office 2021 will be released in 2021, for ...

How to quickly create QR codes with Bing

If you ever need to create a QR code, but you do not know how, Microsoft has an easy-to-use tool available in any program ...

Brave: Onion addresses leaked to DNS traffic

The Tor function included in the Brave web browser, allows users to access .onion dark web domains within ...