First published: Fri Feb 17 2023(Updated: )
An issue in Plone CMS allows attacker to access sensitive information via the RSS feed protlet.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Plone Plone | =4.3 | |
Plone Plone | =4.3.1 | |
Plone Plone | =4.3.2 | |
Plone Plone | =4.3.3 | |
Plone Plone | =4.3.4 | |
Plone Plone | =4.3.5 | |
Plone Plone | =4.3.6 | |
Plone Plone | =4.3.7 | |
Plone Plone | =4.3.8 | |
Plone Plone | =4.3.9 | |
Plone Plone | =4.3.10 | |
Plone Plone | =4.3.11 | |
Plone Plone | =4.3.12 | |
Plone Plone | =4.3.14 | |
Plone Plone | =4.3.15 | |
Plone Plone | =4.3.17 | |
Plone Plone | =4.3.18 | |
Plone Plone | =4.3.19 | |
Plone Plone | =4.3.20 | |
Plone Plone | =5.0 | |
Plone Plone | =5.0-rc1 | |
Plone Plone | =5.0-rc2 | |
Plone Plone | =5.0-rc3 | |
Plone Plone | =5.0.1 | |
Plone Plone | =5.0.2 | |
Plone Plone | =5.0.3 | |
Plone Plone | =5.0.4 | |
Plone Plone | =5.0.5 | |
Plone Plone | =5.0.6 | |
Plone Plone | =5.0.7 | |
Plone Plone | =5.0.8 | |
Plone Plone | =5.0.9 | |
Plone Plone | =5.0.10 | |
Plone Plone | =5.1-alpha2 | |
Plone Plone | =5.1.1 | |
Plone Plone | =5.1.2 | |
Plone Plone | =5.1.4 | |
Plone Plone | =5.1.5 | |
Plone Plone | =5.1.6 | |
Plone Plone | =5.1.7 | |
Plone Plone | =5.1a1-alpha1 | |
Plone Plone | =5.1a2-beta4 | |
Plone Plone | =5.1b2-beta3 | |
Plone Plone | =5.1b3-beta2 | |
Plone Plone | =5.1b4-rc2 | |
Plone Plone | =5.1rc1-rc1 | |
Plone Plone | =5.1rc2 | |
Plone Plone | =5.2.0 | |
Plone Plone | =5.2.1 | |
Plone Plone | =5.2.2 | |
Plone Plone | =5.2.3 | |
Plone Plone | =5.2.4 | |
pip/Plone | >=4.3<5.2.5 | 5.2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.