Show filters
56 Total Results
Displaying 51-56 of 56
Sort by:
Attacker Value
Unknown

CVE-2013-4193

Disclosure Date: March 11, 2014 (last updated October 05, 2023)
typeswidget.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce the immutable setting on unspecified content edit forms, which allows remote attackers to hide fields on the forms via a crafted URL.
0
Attacker Value
Unknown

CVE-2013-4191

Disclosure Date: March 11, 2014 (last updated October 05, 2023)
zip.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 does not properly enforce access restrictions when including content in a zip archive, which allows remote attackers to obtain sensitive information by reading a generated archive.
0
Attacker Value
Unknown

CVE-2013-4199

Disclosure Date: March 11, 2014 (last updated October 05, 2023)
(1) cb_decode.py and (2) linkintegrity.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allow remote authenticated users to cause a denial of service (resource consumption) via a large zip archive, which is expanded (decompressed).
0
Attacker Value
Unknown

CVE-2013-4194

Disclosure Date: March 11, 2014 (last updated October 05, 2023)
The WYSIWYG component (wysiwyg.py) in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers to obtain sensitive information via a crafted URL, which reveals the installation path in an error message.
0
Attacker Value
Unknown

CVE-2013-4192

Disclosure Date: March 11, 2014 (last updated October 05, 2023)
sendto.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote authenticated users to spoof emails via unspecified vectors.
0
Attacker Value
Unknown

CVE-2013-4200

Disclosure Date: January 21, 2014 (last updated November 08, 2023)
The isURLInPortal method in the URLTool class in in_portal.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 treats URLs starting with a space as a relative URL, which allows remote attackers to bypass the allow_external_login_sites filtering property, redirect users to arbitrary web sites, and conduct phishing attacks via a space before a URL in the "next" parameter to acl_users/credentials_cookie_auth/require_login.
0