Total vulnerabilities in the database
Plone 3.3 through 5.1a1 allows remote attackers to obtain information about the ID of sensitive content via unspecified vectors.
Software | From | Fixed in |
---|---|---|
plone / plone | 5.0-a1 | 5.0-a1.x |
plone / plone | 3.3 | 3.3.x |
plone / plone | 4.3.3 | 4.3.3.x |
plone / plone | 4.0.5 | 4.0.5.x |
plone / plone | 4.3.6 | 4.3.6.x |
plone / plone | 5.0.1 | 5.0.1.x |
plone / plone | 4.2.3 | 4.2.3.x |
plone / plone | 5.0.2 | 5.0.2.x |
plone / plone | 5.0-rc2 | 5.0-rc2.x |
plone / plone | 4.0.2 | 4.0.2.x |
plone / plone | 3.3.5 | 3.3.5.x |
plone / plone | 4.3.5 | 4.3.5.x |
plone / plone | 5.0.3 | 5.0.3.x |
plone / plone | 4.3 | 4.3.x |
plone / plone | 4.2.2 | 4.2.2.x |
plone / plone | 4.0.8 | 4.0.8.x |
plone / plone | 3.3.4 | 3.3.4.x |
plone / plone | 4.0.7 | 4.0.7.x |
plone / plone | 3.3.2 | 3.3.2.x |
plone / plone | 4.2.7 | 4.2.7.x |
plone / plone | 4.2.5 | 4.2.5.x |
plone / plone | 5.0.4 | 5.0.4.x |
plone / plone | 4.1.6 | 4.1.6.x |
plone / plone | 4.0.4 | 4.0.4.x |
plone / plone | 4.3.4 | 4.3.4.x |
plone / plone | 4.0.9 | 4.0.9.x |
plone / plone | 4.1.3 | 4.1.3.x |
plone / plone | 4.1 | 4.1.x |
plone / plone | 3.3.1 | 3.3.1.x |
plone / plone | 4.1.4 | 4.1.4.x |
plone / plone | 4.0.10 | 4.0.10.x |
plone / plone | 5.0-rc1 | 5.0-rc1.x |
plone / plone | 4.0 | 4.0.x |
plone / plone | 4.3.7 | 4.3.7.x |
plone / plone | 5.0 | 5.0.x |
plone / plone | 4.3.8 | 4.3.8.x |
plone / plone | 4.1.2 | 4.1.2.x |
plone / plone | 4.1.5 | 4.1.5.x |
plone / plone | 4.3.1 | 4.3.1.x |
plone / plone | 4.2.6 | 4.2.6.x |
plone / plone | 4.0.1 | 4.0.1.x |
plone / plone | 4.1.1 | 4.1.1.x |
plone / plone | 4.2.4 | 4.2.4.x |
plone / plone | 3.3.6 | 3.3.6.x |
plone / plone | 3.3.3 | 3.3.3.x |
plone / plone | 4.3.9 | 4.3.9.x |
plone / plone | 5.0-rc3 | 5.0-rc3.x |
plone / plone | 4.0.3 | 4.0.3.x |
plone / plone | 4.3.2 | 4.3.2.x |
plone / plone | 4.2 | 4.2.x |
plone / plone | 4.2.1 | 4.2.1.x |