FreshPorts - VuXML

This page displays vulnerability information about FreeBSD Ports.

The VUXML data was last processed by FreshPorts on 2024-04-29 06:51:43 UTC

List all Vulnerabilities, by package

List all Vulnerabilities, by date

k68

These are the vulnerabilities relating to the commit you have selected:

VuXML IDDescription
22c6b826-cee0-11da-8578-00123ffe8333plone -- "member_id" Parameter Portrait Manipulation Vulnerability

Secunia reports:

The vulnerability is caused due to missing security declarations in "changeMemberPortrait" and "deletePersonalPortrait". This can be exploited to manipulate or delete another user's portrait via the "member_id" parameter.


Discovery 2006-04-13
Entry 2006-04-18
plone
< 2.1.2_1

CVE-2006-1711
http://dev.plone.org/plone/ticket/5432
http://www.debian.org/security/2006/dsa-1032
http://secunia.com/advisories/19633/
34414a1e-e377-11db-b8ab-000c76189c4czope -- cross-site scripting vulnerability

The Zope Team reports:

A vulnerability has been discovered in Zope, where by certain types of misuse of HTTP GET, an attacker could gain elevated privileges. All Zope versions up to and including 2.10.2 are affected.


Discovery 2007-01-16
Entry 2007-04-05
Modified 2009-03-22
zope
< 2.7.9_2

ge 2.8.0 le 2.8.8

ge 2.9.0 le 2.9.6

ge 2.10.0 le 2.10.2

plone
< 2.5.3

23084
CVE-2007-0240
ports/111119
http://www.zope.org/Products/Zope/Hotfix-2007-03-20/announcement/view
http://plone.org/products/plone/releases/2.5.3
6b3374d4-6b0b-11e5-9909-002590263bf5plone -- multiple vulnerabilities

Plone.org reports:

Versions Affected: All current Plone versions.

Versions Not Affected: None.

Nature of vulnerability: Allows creation of members by anonymous users on sites that have self-registration enabled, allowing bypass of CAPTCHA and similar protections against scripted attacks.

The patch can be added to buildouts as Products.PloneHotfix20150910 (available from PyPI) or downloaded from Plone.org.

Immediate Measures You Should Take: Disable self-registration until you have applied the patch.

Plone's URL checking infrastructure includes a method for checking if URLs valid and located in the Plone site. By passing HTML into this specially crafted url, XSS can be achieved.


Discovery 2015-09-10
Entry 2015-10-05
plone
< 4.3.7

ports/203255
https://plone.org/products/plone-hotfix/releases/20150910
https://plone.org/products/plone/security/advisories/20150910-announcement
https://plone.org/security/20150910/non-persistent-xss-in-plone
https://github.com/plone/Products.CMFPlone/commit/3da710a2cd68587f0bf34f2e7ea1167d6eeee087
b6c18956-5fa3-11db-ad2d-0016179b2dd5plone -- unprotected MembershipTool methods

The Plone Team reports:

Plone 2.0.5, 2.1.2, and 2.5-beta1 does not restrict access to the:

  • changeMemberPortrait
  • deletePersonalPortrait
  • testCurrentPassword

methods, which allows remote attackers to modify portraits.


Discovery 2006-10-19
Entry 2006-10-19
Modified 2006-10-20
plone
< 2.1.2

CVE-2006-1711
http://plone.org/products/plone/releases/2.1.4
https://svn.plone.org/svn/plone/PloneHotfix20060410/trunk/README.txt