{"id":12808,"date":"2021-04-08T07:43:26","date_gmt":"2021-04-08T07:43:26","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=12808"},"modified":"2026-04-17T18:07:46","modified_gmt":"2026-04-17T18:07:46","slug":"adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/","title":{"rendered":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Vulnerability Description<\/h2>\n\n\n\n<p>On March 23, 2021, NSFOCUS detected that Adobe released a security bulletin fixing a code execution vulnerability (CVE-2021-21087). Due to improper sanitization of user inputs, unauthenticated attackers could execute arbitrary code on the target server by sending a crafted, malicious request to the ColdFusion server.<\/p>\n\n\n\n<p>Adobe ColdFusion is a rapid application development platform. ColdFusion is often used in the development of data-driven websites and intranets. However, it can be used for remote services as well such as SOAP web services or Flash. It can also be used as a background server for Adobe Flex applications.<\/p>\n\n\n\n<p>Reference link: <a href=\"https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb21-16.html\">https:\/\/helpx.adobe.com\/security\/products\/coldfusion\/apsb21-16.html<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Scope of Impact<\/h2>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Adobe ColdFusion 2021 &lt;= 2021.0.0.323925<\/li><li>Adobe ColdFusion 2018 &lt;= 2018 Update 10<\/li><li>Adobe ColdFusion 2016 &lt;= 2016 Update 16<\/li><\/ul>\n\n\n\n<p><strong>Unaffected Versions<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Adobe ColdFusion 2021 Update 1<\/li><li>Adobe ColdFusion 2018 Update 11<\/li><li>Adobe ColdFusion 2016 Update 17<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Check for the Vulnerability<\/h2>\n\n\n\n<p><strong>Version Check<\/strong><\/p>\n\n\n\n<p>Users can determine whether their application is vulnerable by checking the current version.<\/p>\n\n\n\n<p>1. Log in to Adobe ColdFusion and access \/CFIDE\/administrator\/index.cfm to check the version in system information.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/04\/a-1-1024x496.jpg\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-12810\" width=\"512\" height=\"248\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/04\/a-1-1024x496.jpg 1024w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/04\/a-1-300x145.jpg 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/04\/a-1-768x372.jpg 768w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2021\/04\/a-1.jpg 1080w\" sizes=\"(max-width: 512px) 100vw, 512px\" \/><\/figure>\n\n\n\n<p>2. Run the cfinfo -version(info) command under bin of the installation directory of Adobe ColdFusion to view the version. If it is one of the affected versions, the application is vulnerable.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Mitigation<\/h2>\n\n\n\n<p><strong>Official Fix<\/strong><\/p>\n\n\n\n<p>Currently, the vendor has fixed this vulnerability in the latest versions. Affected users are advised to upgrade as soon as possible from the following links:<\/p>\n\n\n\n<p>Adobe ColdFusion 2021:<\/p>\n\n\n\n<p><a href=\"https:\/\/cfdownload.adobe.com\/pub\/adobe\/coldfusion\/2021\/updates\/hotfix-001-325996.jar\">https:\/\/cfdownload.adobe.com\/pub\/adobe\/coldfusion\/2021\/updates\/hotfix-001-325996.jar<\/a><\/p>\n\n\n\n<p>Adobe ColdFusion 2018:<\/p>\n\n\n\n<p><a href=\"https:\/\/cfdownload.adobe.com\/pub\/adobe\/coldfusion\/2018\/updates\/hotfix-011-326016.jar\">https:\/\/cfdownload.adobe.com\/pub\/adobe\/coldfusion\/2018\/updates\/hotfix-011-326016.jar<\/a><\/p>\n\n\n\n<p>Adobe ColdFusion 2016:<\/p>\n\n\n\n<p><a href=\"https:\/\/cfdownload.adobe.com\/pub\/adobe\/coldfusion\/2016\/updates\/hotfix-017-325979.jar\">https:\/\/cfdownload.adobe.com\/pub\/adobe\/coldfusion\/2016\/updates\/hotfix-017-325979.jar<\/a><\/p>\n\n\n\n<p>Note: For Adobe ColdFusion 2016 HF7 and earlier, this security update requires ColdFusion JDK\/JRE to be updated to JDK 8u121 or higher.<\/p>\n\n\n\n<p>Additionally, execute the following commands according to the downloaded patch files (on the condition that you have the ability to start or stop ColdFusion services and have full access to the ColdFusion root directory.)<\/p>\n\n\n\n<p>Execute the following command on Windows:<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<p class=\"has-text-color has-background has-very-dark-gray-color has-very-light-gray-background-color\">&lt;cf_root&gt;\/jre\/bin\/java.exe -jar &lt;jar-file-dir&gt;\/hotfix-*.jar<\/p>\n<\/div><\/div>\n\n\n\n<p>Execute the following command on Linux:<\/p>\n\n\n\n<p class=\"has-background has-very-light-gray-background-color\">&lt;cf_root&gt;\/jre\/bin\/java -jar &lt;jar-file-dir&gt;\/hotfix-*.jar<\/p>\n\n\n\n<p>Ensure that the JRE bundled with ColdFusion is used to execute the downloaded JAR. In a standalone installation, ColdFusion must be installed under &lt;cf_root&gt;\/jre\/bin.<\/p>\n\n\n\n<p>For more information, see Adobe&#8217;s ColdFusion User Guide at the following link:<\/p>\n\n\n\n<p><a href=\"https:\/\/helpx.adobe.com\/coldfusion\/configuring-administering\/using-the-coldfusion-administrator.html#serverupdate\">https:\/\/helpx.adobe.com\/coldfusion\/configuring-administering\/using-the-coldfusion-administrator.html#serverupdate<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Statement<\/h2>\n\n\n\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability Description On March 23, 2021, NSFOCUS detected that Adobe released a security bulletin fixing a code execution vulnerability (CVE-2021-21087). Due to improper sanitization of user inputs, unauthenticated attackers could execute arbitrary code on the target server by sending a crafted, malicious request to the ColdFusion server. Adobe ColdFusion is a rapid application development platform. [&hellip;]<\/p>\n","protected":false},"author":6,"featured_media":7712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[6],"tags":[49],"class_list":["post-12808","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-emergency-response","tag-adobe"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Vulnerability Description On March 23, 2021, NSFOCUS detected that Adobe released a security bulletin fixing a code execution vulnerability\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-08T07:43:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg\" \/>\n<meta name=\"author\" content=\"Jie Ji\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Vulnerability Description On March 23, 2021, NSFOCUS detected that Adobe released a security bulletin fixing a code execution vulnerability\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jie Ji\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/\"},\"author\":{\"name\":\"Jie Ji\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\"},\"headline\":\"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert\",\"datePublished\":\"2021-04-08T07:43:26+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/\"},\"wordCount\":519,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"keywords\":[\"Adobe\"],\"articleSection\":[\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/\",\"name\":\"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"datePublished\":\"2021-04-08T07:43:26+00:00\",\"dateModified\":\"2026-04-17T18:07:46+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/ADOBE.jpg\",\"width\":539,\"height\":187,\"caption\":\"Adobe logo with stylized red \\\"A\\\".\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/1077d8fcd7e52c96f17a33b63a0d157b\",\"name\":\"Jie Ji\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g\",\"caption\":\"Jie Ji\"},\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/jji\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS","og_description":"Vulnerability Description On March 23, 2021, NSFOCUS detected that Adobe released a security bulletin fixing a code execution vulnerability","og_url":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2021-04-08T07:43:26+00:00","article_modified_time":"2026-04-17T18:07:46+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","type":"","width":"","height":""}],"author":"Jie Ji","twitter_card":"summary_large_image","twitter_title":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS","twitter_description":"Vulnerability Description On March 23, 2021, NSFOCUS detected that Adobe released a security bulletin fixing a code execution vulnerability","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","twitter_misc":{"Escrito por":"Jie Ji","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/"},"author":{"name":"Jie Ji","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b"},"headline":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert","datePublished":"2021-04-08T07:43:26+00:00","dateModified":"2026-04-17T18:07:46+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/"},"wordCount":519,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","keywords":["Adobe"],"articleSection":["Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/","name":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","datePublished":"2021-04-08T07:43:26+00:00","dateModified":"2026-04-17T18:07:46+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/12\/ADOBE.jpg","width":539,"height":187,"caption":"Adobe logo with stylized red \"A\"."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/adobe-coldfusion-remote-code-execution-vulnerability-cve-2021-21087-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"Adobe ColdFusion Remote Code Execution Vulnerability (CVE-2021-21087) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/1077d8fcd7e52c96f17a33b63a0d157b","name":"Jie Ji","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/61cb438513c138ce3f1f49e3485f113a0215220de5e284a2bd4e85358f6c8d02?s=96&d=mm&r=g","caption":"Jie Ji"},"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/jji\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12808","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=12808"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/12808\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7712"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=12808"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=12808"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=12808"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}