Filtered by vendor Zope
Subscribe
Total
51 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2001-1227 | 1 Zope | 1 Zope | 2024-11-20 | 7.5 HIGH | N/A |
Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags. | |||||
CVE-2001-0569 | 1 Zope | 1 Zope | 2024-11-20 | 2.1 LOW | N/A |
Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet. | |||||
CVE-2001-0568 | 1 Zope | 1 Zope | 2024-11-20 | 2.1 LOW | N/A |
Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes. | |||||
CVE-2001-0567 | 1 Zope | 1 Zope | 2024-11-20 | 4.6 MEDIUM | N/A |
Digital Creations Zope 2.3.2 and earlier allows a local attacker to gain additional privileges via the changing of ZClass permission mappings for objects and methods in the ZClass. | |||||
CVE-2001-0128 | 6 Conectiva, Debian, Freebsd and 3 more | 7 Linux, Debian Linux, Freebsd and 4 more | 2024-11-20 | 7.2 HIGH | N/A |
Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. | |||||
CVE-2000-1212 | 1 Zope | 1 Zope | 2024-11-20 | 5.0 MEDIUM | N/A |
Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects. | |||||
CVE-2000-1211 | 1 Zope | 1 Zope | 2024-11-20 | 7.5 HIGH | N/A |
Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities. | |||||
CVE-2000-0725 | 1 Zope | 1 Zope | 2024-11-20 | 7.2 HIGH | N/A |
Zope before 2.2.1 does not properly restrict access to the getRoles method, which allows users who can edit DTML to add or modify roles by modifying the roles list that is included in a request. | |||||
CVE-2000-0483 | 2 Redhat, Zope | 2 Linux Powertools, Zope | 2024-11-20 | 7.5 HIGH | N/A |
The DocumentTemplate package in Zope 2.2 and earlier allows a remote attacker to modify DTMLDocuments or DTMLMethods without authorization. | |||||
CVE-2000-0062 | 1 Zope | 1 Zope | 2024-11-20 | 10.0 HIGH | N/A |
The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities. | |||||
CVE-2024-47532 | 1 Zope | 1 Restrictedpython | 2024-11-15 | N/A | 6.5 MEDIUM |
RestrictedPython is a restricted execution environment for Python to run untrusted code. A user can gain access to protected (and potentially sensible) information indirectly via AttributeError.obj and the string module. The problem will be fixed in version 7.3. As a workaround, If the application does not require access to the module string, it can remove it from RestrictedPython.Utilities.utility_builtins or otherwise do not make it available in the restricted execution environment. |