{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-18T14:25:36.455","vulnerabilities":[{"cve":{"id":"CVE-2009-1878","sourceIdentifier":"cve@mitre.org","published":"2009-08-18T22:30:00.390","lastModified":"2025-04-09T00:30:58.490","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"Session fixation vulnerability in Adobe ColdFusion 8.0.1 and earlier allows remote attackers to hijack web sessions via unspecified vectors."},{"lang":"es","value":"Vulnerabilidad de fijación de sesión en Adobe ColdFusion v8.0.1 y versiones anteriores, que permite a los atacantes remotos, secuestrar una sesión web a través de vectores no especificados."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:N","baseScore":5.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:*:*:*:*:*:*:*:*","versionEndIncluding":"8.0.1","matchCriteriaId":"2E1F57AD-3FE8-45F5-ACAC-0AA2FE5FF74D"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.0:*:*:*:*:*:*:*","matchCriteriaId":"73DAF349-B29C-44D0-818B-8D665D2B35EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_multi-server:*:*:*:*:*","matchCriteriaId":"7095177E-CF72-4B79-8FF4-DB9C4353CDD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"D003D474-8CC0-4C68-917B-FD750A029E4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.0:*:linux:*:*:*:*:*","matchCriteriaId":"1E13C3EA-3137-4C41-BB77-BC2625E2C905"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.0:*:solaris:*:*:*:*:*","matchCriteriaId":"98E63512-A7F5-404B-B334-FA1433BA1A5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.1:*:*:*:*:*:*:*","matchCriteriaId":"720437A6-66D3-4DD6-A40F-23FC107AD710"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_multi-server:*:*:*:*:*","matchCriteriaId":"53A802EA-FB56-4FBC-91C5-B824A8034FBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.1:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"8B70C03A-1B4B-46D9-99CB-45EFB2109F15"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.1:*:linux:*:*:*:*:*","matchCriteriaId":"FD8C938D-8194-4E86-AAB1-9AA984D81C6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:6.1:*:solaris:*:*:*:*:*","matchCriteriaId":"427F0A38-747D-42FC-88D5-48926487EF6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0:*:*:*:*:*:*:*","matchCriteriaId":"31D67D32-16BD-437C-8423-4704364EE737"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_multi-server:*:*:*:*:*","matchCriteriaId":"FEF92A65-AE47-4A8B-BCBF-E8839A88A1C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"B9C93E8B-6AD0-473C-9161-C71E03BFDEC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0:*:linux:*:*:*:*:*","matchCriteriaId":"DB570811-F637-4E86-8A0E-73F2F9B29126"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0:*:solaris:*:*:*:*:*","matchCriteriaId":"7424F3BC-B8A0-4A45-8E36-16A10D0AD745"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"6C1CF5F6-BA6A-4EAC-8E94-238E0B9C64B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.0.2:*:*:*:*:*:*:*","matchCriteriaId":"B015715F-9672-480E-B0AA-968D8C9070D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:7.2:unknown:mx:*:*:*:*:*","matchCriteriaId":"8E7948AA-CB18-4666-B469-871F0680134A"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:8.0:*:*:*:*:*:*:*","matchCriteriaId":"DD6C1877-7412-4FBE-9641-334971F9D153"},{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:coldfusion:8.1:*:*:*:*:*:*:*","matchCriteriaId":"810E1B9C-E32F-4788-8705-67F855DC9EE6"}]}]}],"references":[{"url":"http://osvdb.org/57191","source":"cve@mitre.org"},{"url":"http://www.adobe.com/support/security/bulletins/apsb09-12.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://osvdb.org/57191","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.adobe.com/support/security/bulletins/apsb09-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}