Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
zope zope 2.2.4 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2002-0170
Zope 2.2.0 up to and including 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration.
Zope Zope 2.2.2
Zope Zope 2.2.3
Zope Zope 2.2.4
Zope Zope 2.4.1
Zope Zope 2.4.2
Zope Zope 2.3.1
Zope Zope 2.3.2
Zope Zope 2.5.0
Zope Zope 2.5.1b1
Zope Zope 2.2.5
Zope Zope 2.3.0
Zope Zope 2.4.3
Zope Zope 2.4.4b1
Zope Zope 2.2.0
Zope Zope 2.2.1
Zope Zope 2.3.3
Zope Zope 2.4.0
7.5
CVSSv2
CVE-2001-1227
Zope prior to 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags.
Zope Zope 2.2.3
Zope Zope 2.2.4
Zope Zope 2.2.0
Zope Zope 2.2.1
Zope Zope 2.2.2
Zope Zope 2.2.5
7.5
CVSSv2
CVE-2001-1278
Zope prior to 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags.
Zope Zope 2.2.4
Zope Zope 2.2.0
Zope Zope 2.2.1
Zope Zope 2.2.2
Zope Zope 2.2.3
7.5
CVSSv2
CVE-2000-1211
Zope 2.2.0 up to and including 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow malicious users to perform unauthorized activities.
Zope Zope 2.2.1b1
Zope Zope 2.2.2
Zope Zope 2.2.3
Zope Zope 2.2.4
Zope Zope 2.2.0b3
Zope Zope 2.2.1
Zope Zope 2.2.0
Zope Zope 2.2.0a1
Zope Zope 2.2.0b1
Zope Zope 2.2.0b2
Zope Zope 2.2.0b4
7.2
CVSSv2
CVE-2001-0128
Zope prior to 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges.
Conectiva Linux 5.0
Conectiva Linux 5.1
Conectiva Linux 6.0
Zope Zope
Redhat Linux Powertools 6.1
Redhat Linux Powertools 6.2
Redhat Linux Powertools 7.0
Conectiva Linux 4.2
Redhat Linux 6.1
Redhat Linux 6.2
Redhat Linux 7.0
Debian Debian Linux 2.2
Freebsd Freebsd 6.2
Mandrakesoft Mandrake Linux 7.1
Mandrakesoft Mandrake Linux 7.2
5
CVSSv2
CVE-2000-1212
Zope 2.2.0 up to and including 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.
Zope Zope 2.2.0b4
Zope Zope 2.2.1
Zope Zope 2.2.0b2
Zope Zope 2.2.0b3
Zope Zope 2.2.0a1
Zope Zope 2.2.0b1
Zope Zope 2.2.3
Zope Zope 2.2.4
Zope Zope 2.2.0
Zope Zope 2.2.1b1
Zope Zope 2.2.2
4
CVSSv2
CVE-2008-5102
PythonScripts in Zope 2 2.11.2 and previous versions, as used in Conga and other products, allows remote authenticated users to cause a denial of service (resource consumption or application halt) via certain (1) raise or (2) import statements.
Zope Zope 2.10.3-final
Zope Zope 2.10.2-final
Zope Zope 2.10.5
Zope Zope 2.9.0-final
Zope Zope 2.9.6
Zope Zope 2.9.5
Zope Zope 2.8.0-final
Zope Zope 2.8.0-b2
Zope Zope 2.8.7
Zope Zope 2.8.6
Zope Zope 2.7.6-final
Zope Zope 2.7.6-b2
Zope Zope 2.7.4-c1
Zope Zope 2.7.4-b2
Zope Zope 2.7.1-b2
Zope Zope 2.7.1-b1
Zope Zope 2.7.0-b1
Zope Zope 2.7.0-a1
Zope Zope 2.6.2.b4
Zope Zope 2.6.2.b3
Zope Zope 2.6.4
Zope Zope 2.6.3
1 EDB exploit
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-7073
CVE-2024-5496
CVE-2024-5495
XPath injection
bypass
CVE-2024-30043
CVE-2024-24919
denial of service
CVE-2024-35468
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started