Show filters
111 Total Results
Displaying 1-10 of 111
Sort by:
Attacker Value
Unknown
CVE-2024-22889
Disclosure Date: March 06, 2024 (last updated January 22, 2025)
Due to incorrect access control in Plone version v6.0.9, remote attackers can view and list all files hosted on the website via sending a crafted request.
0
Attacker Value
Unknown
CVE-2024-23756
Disclosure Date: February 08, 2024 (last updated February 16, 2024)
The HTTP PUT and DELETE methods are enabled in the Plone official Docker version 5.2.13 (5221), allowing unauthenticated attackers to execute dangerous actions such as uploading files to the server or deleting them.
0
Attacker Value
Unknown
CVE-2024-23054
Disclosure Date: February 05, 2024 (last updated February 14, 2024)
An issue in Plone Docker Official Image 5.2.13 (5221) open-source software that could allow for remote code execution due to a package listed in ++plone++static/components not existing in the public package index (npm).
0
Attacker Value
Unknown
CVE-2024-23055
Disclosure Date: January 25, 2024 (last updated February 03, 2024)
An issue in Plone Docker Official Image 5.2.13 (5221) open-source software allows for remote code execution via improper validation of input by the HOST headers.
0
Attacker Value
Unknown
CVE-2024-0669
Disclosure Date: January 18, 2024 (last updated January 27, 2024)
A Cross-Frame Scripting vulnerability has been found on Plone CMS affecting verssion below 6.0.5. An attacker could store a malicious URL to be opened by an administrator and execute a malicios iframe element.
0
Attacker Value
Unknown
CVE-2021-33926
Disclosure Date: February 17, 2023 (last updated October 08, 2023)
An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
0
Attacker Value
Unknown
CVE-2022-23599
Disclosure Date: January 28, 2022 (last updated October 07, 2023)
Products.ATContentTypes are the core content types for Plone 2.1 - 4.3. Versions of Plone that are dependent on Products.ATContentTypes prior to version 3.0.6 are vulnerable to reflected cross site scripting and open redirect when an attacker can get a compromised version of the image_view_fullscreen page in a cache, for example in Varnish. The technique is known as cache poisoning. Any later visitor can get redirected when clicking on a link on this page. Usually only anonymous users are affected, but this depends on the user's cache settings. Version 3.0.6 of Products.ATContentTypes has been released with a fix. This version works on Plone 5.2, Python 2 only. As a workaround, make sure the image_view_fullscreen page is not stored in the cache. More information about the vulnerability and cvmitigation measures is available in the GitHub Security Advisory.
0
Attacker Value
Unknown
CVE-2021-35959
Disclosure Date: June 30, 2021 (last updated February 22, 2025)
In Plone 5.0 through 5.2.4, Editors are vulnerable to XSS in the folder contents view, if a Contributor has created a folder with a SCRIPT tag in the description field.
0
Attacker Value
Unknown
CVE-2021-33507
Disclosure Date: May 21, 2021 (last updated February 22, 2025)
Zope Products.CMFCore before 2.5.1 and Products.PluggableAuthService before 2.6.2, as used in Plone through 5.2.4 and other products, allow Reflected XSS.
0
Attacker Value
Unknown
CVE-2021-33513
Disclosure Date: May 21, 2021 (last updated February 22, 2025)
Plone through 5.2.4 allows XSS via the inline_diff methods in Products.CMFDiffTool.
0