Page 3 of 37 results (0.009 seconds)

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

19 Sep 2006 — The docutils module in Zope (Zope2) 2.7.0 through 2.7.9 and 2.8.0 through 2.8.8 does not properly handle web pages with reStructuredText (reST) markup, which allows remote attackers to read arbitrary files via a csv_table directive, a different vulnerability than CVE-2006-3458. El módulo docutils en Zope (Zope2) desde 2.7.0 hasta 2.7.9 y desde 2.8.0 hasta 2.8.8 no maneja adecuadamente páginas web con el marcado reStructuredText (reST), lo cual permite a atacantes remotos leer ficheros de su elección vía una... • http://mail.zope.org/pipermail/zope-announce/2006-August/002005.html •

CVSS: 5.5EPSS: 0%CPEs: 21EXPL: 0

07 Jul 2006 — Zope 2.7.0 to 2.7.8, 2.8.0 to 2.8.7, and 2.9.0 to 2.9.3 (Zope2) does not disable the "raw" command when providing untrusted users with restructured text (reStructuredText) functionality from docutils, which allows local users to read arbitrary files. Zope 2.7.0 a 2.7.8, 2.8.0 a 2.8.7, y 2.9.0 a 2.9.3 (Zope2) no desabilita el comando "raw" cuando se mantiene a usuarios no válidos con la funcionalidad de texto reestructurado (reStructuredText) desde docutils, lo cual permite a usuarios locales leer archivos d... • http://mail.zope.org/pipermail/zope-announce/2006-July/001984.html •

CVSS: 9.1EPSS: 2%CPEs: 5EXPL: 0

27 Oct 2005 — docutils in Zope 2.6, 2.7 before 2.7.8, and 2.8 before 2.8.2 allows remote attackers to include arbitrary files via include directives in RestructuredText functionality. • http://secunia.com/advisories/17173 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

23 Jul 2002 — The "through the web code" capability for Zope 2.0 through 2.5.1 b1 allows untrusted users to shut down the Zope server via certain headers. La capacidad through the web code de Zope desde la versión 2.0 a la 2.5.1 b1, permite a usuarios no fiables parar el servidor mediante ciertas cabeceras. • http://www.iss.net/security_center/static/9621.php •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 0

23 Jul 2002 — ZCatalog plug-in index support capability for Zope 2.4.0 through 2.5.1 allows anonymous users and untrusted code to bypass access restrictions and call arbitrary methods of catalog indexes. El plug-in de capacidad de soporte de índice ZCatalog para Zope 2.4.0 a 2.5.1 permite a usuarios anónimos y código no de confianza evadir ciertas restricciones y llamar a métodos arbitrarios de ínidices de catálogos. • http://www.debian.org/security/2004/dsa-490 •

CVSS: 9.1EPSS: 0%CPEs: 17EXPL: 0

22 Apr 2002 — Zope 2.2.0 through 2.5.1 does not properly verify the access for objects with proxy roles, which could allow some users to access documents in violation of the intended configuration. Zope 2.2.0 a 2.5.1 no verifica adecuamente el acceso a objetos con perfiles del proxy, lo que podría permitir a algunos usuarios acceder a documentos violando la configuración pretendida. • http://marc.info/?l=bugtraq&m=101503023511996&w=2 •

CVSS: 7.5EPSS: 0%CPEs: 6EXPL: 0

10 Oct 2001 — Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags. • http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-080.php3 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

10 Oct 2001 — Zope before 2.2.4 allows partially trusted users to bypass security controls for certain methods by accessing the methods through the fmt attribute of dtml-var tags. • http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-080.php3 •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

14 Aug 2001 — Digital Creations Zope 2.3.2 and earlier allows a local attacker to gain additional privileges via the changing of ZClass permission mappings for objects and methods in the ZClass. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000407 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

27 Jul 2001 — Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes. • http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000382 •