CVE-2021-33926
17.02.2023, 18:15
An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
Vendor | Product | Version |
---|---|---|
plone | plone | 4.3 |
plone | plone | 4.3.1 |
plone | plone | 4.3.2 |
plone | plone | 4.3.3 |
plone | plone | 4.3.4 |
plone | plone | 4.3.5 |
plone | plone | 4.3.6 |
plone | plone | 4.3.7 |
plone | plone | 4.3.8 |
plone | plone | 4.3.9 |
plone | plone | 4.3.10 |
plone | plone | 4.3.11 |
plone | plone | 4.3.12 |
plone | plone | 4.3.14 |
plone | plone | 4.3.15 |
plone | plone | 4.3.17 |
plone | plone | 4.3.18 |
plone | plone | 4.3.19 |
plone | plone | 4.3.20 |
plone | plone | 5.0 |
plone | plone | 5.0:rc1 |
plone | plone | 5.0:rc2 |
plone | plone | 5.0:rc3 |
plone | plone | 5.0.1 |
plone | plone | 5.0.2 |
plone | plone | 5.0.3 |
plone | plone | 5.0.4 |
plone | plone | 5.0.5 |
plone | plone | 5.0.6 |
plone | plone | 5.0.7 |
plone | plone | 5.0.8 |
plone | plone | 5.0.9 |
plone | plone | 5.0.10 |
plone | plone | 5.1:alpha2 |
plone | plone | 5.1.1 |
plone | plone | 5.1.2 |
plone | plone | 5.1.4 |
plone | plone | 5.1.5 |
plone | plone | 5.1.6 |
plone | plone | 5.1.7 |
plone | plone | 5.1a1:a1 |
plone | plone | 5.1a2:a2 |
plone | plone | 5.1b2:b2 |
plone | plone | 5.1b3:b3 |
plone | plone | 5.1b4:b4 |
plone | plone | 5.1rc1:rc1 |
plone | plone | 5.1rc2:rc2 |
plone | plone | 5.2.0 |
plone | plone | 5.2.1 |
plone | plone | 5.2.2 |
plone | plone | 5.2.3 |
plone | plone | 5.2.4 |
𝑥
= Vulnerable software versions
References