Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zope zope 2.3.1 vulnerabilities and exploits
(subscribe to this query)
668
VMScore
CVE-2002-0170
Zope 2.2.0 up to and including 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration.
Zope Zope 2.2.2
Zope Zope 2.2.3
Zope Zope 2.2.4
Zope Zope 2.4.1
Zope Zope 2.4.2
Zope Zope 2.3.1
Zope Zope 2.3.2
Zope Zope 2.5.0
Zope Zope 2.5.1b1
Zope Zope 2.2.5
Zope Zope 2.3.0
Zope Zope 2.4.3
Zope Zope 2.4.4b1
Zope Zope 2.2.0
Zope Zope 2.2.1
Zope Zope 2.3.3
Zope Zope 2.4.0
405
VMScore
CVE-2008-5102
PythonScripts in Zope 2 2.11.2 and previous versions, as used in Conga and other products, allows remote authenticated users to cause a denial of service (resource consumption or application halt) via certain (1) raise or (2) import statements.
Zope Zope 2.10.3-final
Zope Zope 2.10.2-final
Zope Zope 2.10.5
Zope Zope 2.9.0-final
Zope Zope 2.9.6
Zope Zope 2.9.5
Zope Zope 2.8.0-final
Zope Zope 2.8.0-b2
Zope Zope 2.8.7
Zope Zope 2.8.6
Zope Zope 2.7.6-final
Zope Zope 2.7.6-b2
Zope Zope 2.7.4-c1
Zope Zope 2.7.4-b2
Zope Zope 2.7.1-b2
Zope Zope 2.7.1-b1
Zope Zope 2.7.0-b1
Zope Zope 2.7.0-a1
Zope Zope 2.6.2.b4
Zope Zope 2.6.2.b3
Zope Zope 2.6.4
Zope Zope 2.6.3
1 EDB exploit
187
VMScore
CVE-2001-0568
Digital Creations Zope 2.3.1 b1 and previous versions allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes.
Zope Zope
187
VMScore
CVE-2001-0569
Digital Creations Zope 2.3.1 b1 and previous versions contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet.
Zope Zope
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48654
CVE-2024-2757
authentication bypass
CVE-2024-3194
CVE-2024-33640
CVE-2024-21111
dos
insecure direct object reference
CVE-2024-21345
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started