Plone 4.x up to and including 4.3.11 and 5.x up to and including 5.0.6 allow remote malicious users to bypass a sandbox protection mechanism and obtain sensitive information by leveraging the Python string format method.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
plone plone 5.0.2 |
||
plone plone 4.3.11 |
||
plone plone 4.3.4 |
||
plone plone 4.3.2 |
||
plone plone 4.2.3 |
||
plone plone 4.2.1 |
||
plone plone 4.1.5 |
||
plone plone 5.0 |
||
plone plone 4.1 |
||
plone plone 4.0.9 |
||
plone plone 4.0.1 |
||
plone plone 4.3.9 |
||
plone plone 4.3.8 |
||
plone plone 4.3.7 |
||
plone plone 4.3.6 |
||
plone plone 4.2 |
||
plone plone 4.1.6 |
||
plone plone 5.1 |
||
plone plone 4.0.7 |
||
plone plone 4.0.5 |
||
plone plone 4.0.4 |
||
plone plone 4.0.3 |
||
plone plone 5.0.6 |
||
plone plone 5.0.5 |
||
plone plone 5.0.4 |
||
plone plone 5.0.3 |
||
plone plone 4.3.1 |
||
plone plone 4.3 |
||
plone plone 4.2.7 |
||
plone plone 4.2.6 |
||
plone plone 4.2.5 |
||
plone plone 4.1.4 |
||
plone plone 4.1.3 |
||
plone plone 4.1.2 |
||
plone plone 5.0.1 |
||
plone plone 4.3.10 |
||
plone plone 4.3.5 |
||
plone plone 4.3.3 |
||
plone plone 4.2.4 |
||
plone plone 4.2.2 |
||
plone plone 4.1.1 |
||
plone plone 4.0.10 |
||
plone plone 4.0.8 |
||
plone plone 4.0.2 |
||
plone plone 4.0 |