Zero-day Vulnerability Database

Change view:

Zero-day vulnerabilities discovered: 1

Security bypass in Plone

Security bypass

The vulnerability allows a remote attacker to bypass security restrictions on the target system.

The weakness exists due to improper checking for authorization by A remote attacker can modify the properties of arbitrary accounts.

Successful exploitation of the vulnerability may result in attacker's access to the vulnerable system.

Note: the vulnerability was being actively exploited.

Software: Plone

Vulnerability Scanning SaaS

Vulnerability scanning SaaS service is online 3-rd generation vulnerability scanner with scheduled assessments and vulnerability subscription. You can use service to check security of your network perimeter.