First published: Mon Jun 06 2011(Updated: )
Common Vulnerabilities and Exposures assigned an identifier <a href="https://access.redhat.com/security/cve/CVE-2011-1948">CVE-2011-1948</a> to the following vulnerability: Cross-site scripting (XSS) vulnerability in Plone 4.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted URL. References: [1] <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1948">http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-1948</a> [2] <a href="http://www.securityfocus.com/archive/1/archive/1/518155/100/0/threaded">http://www.securityfocus.com/archive/1/archive/1/518155/100/0/threaded</a> [3] <a href="http://plone.org/products/plone/security/advisories/CVE-2011-1948">http://plone.org/products/plone/security/advisories/CVE-2011-1948</a> [4] <a href="http://www.securityfocus.com/bid/48005">http://www.securityfocus.com/bid/48005</a> [5] <a href="http://secunia.com/advisories/44775">http://secunia.com/advisories/44775</a> [6] <a href="http://secunia.com/advisories/44776">http://secunia.com/advisories/44776</a> [7] <a href="http://xforce.iss.net/xforce/xfdb/67693">http://xforce.iss.net/xforce/xfdb/67693</a>
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Plone | =3.3 | |
Plone Plone | =1.0 | |
Plone Plone | =4.0.5 | |
Plone Plone | =3.0.1 | |
Plone Plone | =1.0.3 | |
Plone Plone | =3.0 | |
Plone Plone | =3.2.3 | |
Plone Plone | =3.1.4 | |
Plone Plone | =3.1.5.1 | |
Plone Plone | =2.1.4 | |
Plone Plone | =4.0.2 | |
Plone Plone | =3.3.5 | |
Plone Plone | =3.0.6 | |
Plone Plone | =2.5.4 | |
Plone Plone | =3.2 | |
Plone Plone | =3.1.1 | |
Plone Plone | =2.1.1 | |
Plone Plone | =3.3.4 | |
Plone Plone | =2.0.3 | |
Plone Plone | =1.0.4 | |
Plone Plone | =3.3.2 | |
Plone Plone | =2.0 | |
Plone Plone | =4.0.4 | |
Plone Plone | =3.1.7 | |
Plone Plone | =2.5.1 | |
Plone Plone | =2.5.3 | |
Plone Plone | =3.2.2 | |
Plone Plone | =2.0.4 | |
Plone Plone | =2.1.2 | |
Plone Plone | =1.0.1 | |
Plone Plone | =3.0.3 | |
Plone Plone | =3.3.1 | |
Plone Plone | =3.0.4 | |
Plone Plone | =2.0.1 | |
Plone Plone | =2.0.2 | |
Plone Plone | =3.1.2 | |
Plone Plone | =3.2.1 | |
Plone Plone | =4.0 | |
Plone Plone | =1.0.2 | |
Plone Plone | =2.0.5 | |
Plone Plone | =3.0.5 | |
Plone Plone | =4.0.6.1 | |
Plone Plone | =2.5 | |
Plone Plone | =1.0.6 | |
Plone Plone | =2.5.2 | |
Plone Plone | =4.0.1 | |
Plone Plone | =3.0.2 | |
Plone Plone | =2.1 | |
Plone Plone | =3.1 | |
Plone Plone | =3.3.3 | |
Plone Plone | =2.1.3 | |
Plone Plone | =3.1.6 | |
Plone Plone | =3.1.3 | |
Plone Plone | =4.0.3 | |
Plone Plone | =1.0.5 | |
Plone Plone | =2.5.5 | |
Plone Plone | <=4.1 | |
pip/Plone | >=0<4.1.1 | 4.1.1 |
pip/Products.CMFPlone | >=4.1a1<=4.1rc2 | 4.1rc3 |
pip/Products.CMFPlone | <4.0.7 | 4.0.7 |
pip/Products.PasswordResetTool | <2.0.6 | 2.0.6 |
<=4.1 | ||
=1.0 | ||
=1.0.1 | ||
=1.0.2 | ||
=1.0.3 | ||
=1.0.4 | ||
=1.0.5 | ||
=1.0.6 | ||
=2.0 | ||
=2.0.1 | ||
=2.0.2 | ||
=2.0.3 | ||
=2.0.4 | ||
=2.0.5 | ||
=2.1 | ||
=2.1.1 | ||
=2.1.2 | ||
=2.1.3 | ||
=2.1.4 | ||
=2.5 | ||
=2.5.1 | ||
=2.5.2 | ||
=2.5.3 | ||
=2.5.4 | ||
=2.5.5 | ||
=3.0 | ||
=3.0.1 | ||
=3.0.2 | ||
=3.0.3 | ||
=3.0.4 | ||
=3.0.5 | ||
=3.0.6 | ||
=3.1 | ||
=3.1.1 | ||
=3.1.2 | ||
=3.1.3 | ||
=3.1.4 | ||
=3.1.5.1 | ||
=3.1.6 | ||
=3.1.7 | ||
=3.2 | ||
=3.2.1 | ||
=3.2.2 | ||
=3.2.3 | ||
=3.3 | ||
=3.3.1 | ||
=3.3.2 | ||
=3.3.3 | ||
=3.3.4 | ||
=3.3.5 | ||
=4.0 | ||
=4.0.1 | ||
=4.0.2 | ||
=4.0.3 | ||
=4.0.4 | ||
=4.0.5 | ||
=4.0.6.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.