Unspecified vulnerability in Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to execute arbitrary Python code via vectors involving the ZEO network protocol.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:00
Type | Values Removed | Values Added |
---|---|---|
References | () http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html - | |
References | () http://osvdb.org/56827 - | |
References | () http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2 - | |
References | () http://secunia.com/advisories/36204 - Vendor Advisory | |
References | () http://secunia.com/advisories/36205 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/35987 - | |
References | () http://www.vupen.com/english/advisories/2009/2217 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/52377 - |
Information
Published : 2009-08-07 19:30
Updated : 2024-11-21 01:00
NVD link : CVE-2009-0668
Mitre link : CVE-2009-0668
CVE.ORG link : CVE-2009-0668
JSON object : View
Products Affected
zope
- zodb
CWE