Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2013-4188

traverser.py in Plone 2.1 through 4.1, 4.2.x through 4.2.5, and 4.3.x through 4.3.1 allows remote attackers with administrator privileges to cause a denial of service (infinite loop and resource consumption) via unspecified vectors related to "retrieving information for certain resources."
Exploit prediction scoring system (EPSS) score
EPSS Score 0.006
EPSS Ranking 67.4%
CVSS Severity
CVSS v2 Score 4.3
Products affected by CVE-2013-4188
  • Plone » Plone » Version: 2.1
    cpe:2.3:a:plone:plone:2.1
  • Plone » Plone » Version: 2.1.1
    cpe:2.3:a:plone:plone:2.1.1
  • Plone » Plone » Version: 2.1.2
    cpe:2.3:a:plone:plone:2.1.2
  • Plone » Plone » Version: 2.1.3
    cpe:2.3:a:plone:plone:2.1.3
  • Plone » Plone » Version: 2.1.4
    cpe:2.3:a:plone:plone:2.1.4
  • Plone » Plone » Version: 2.5
    cpe:2.3:a:plone:plone:2.5
  • Plone » Plone » Version: 2.5.1
    cpe:2.3:a:plone:plone:2.5.1
  • Plone » Plone » Version: 2.5.2
    cpe:2.3:a:plone:plone:2.5.2
  • Plone » Plone » Version: 2.5.3
    cpe:2.3:a:plone:plone:2.5.3
  • Plone » Plone » Version: 2.5.4
    cpe:2.3:a:plone:plone:2.5.4
  • Plone » Plone » Version: 2.5.5
    cpe:2.3:a:plone:plone:2.5.5
  • Plone » Plone » Version: 3.0
    cpe:2.3:a:plone:plone:3.0
  • Plone » Plone » Version: 3.0.1
    cpe:2.3:a:plone:plone:3.0.1
  • Plone » Plone » Version: 3.0.2
    cpe:2.3:a:plone:plone:3.0.2
  • Plone » Plone » Version: 3.0.3
    cpe:2.3:a:plone:plone:3.0.3
  • Plone » Plone » Version: 3.0.4
    cpe:2.3:a:plone:plone:3.0.4
  • Plone » Plone » Version: 3.0.5
    cpe:2.3:a:plone:plone:3.0.5
  • Plone » Plone » Version: 3.0.6
    cpe:2.3:a:plone:plone:3.0.6
  • Plone » Plone » Version: 3.1
    cpe:2.3:a:plone:plone:3.1
  • Plone » Plone » Version: 3.1.1
    cpe:2.3:a:plone:plone:3.1.1
  • Plone » Plone » Version: 3.1.2
    cpe:2.3:a:plone:plone:3.1.2
  • Plone » Plone » Version: 3.1.3
    cpe:2.3:a:plone:plone:3.1.3
  • Plone » Plone » Version: 3.1.4
    cpe:2.3:a:plone:plone:3.1.4
  • Plone » Plone » Version: 3.1.5.1
    cpe:2.3:a:plone:plone:3.1.5.1
  • Plone » Plone » Version: 3.1.6
    cpe:2.3:a:plone:plone:3.1.6
  • Plone » Plone » Version: 3.1.7
    cpe:2.3:a:plone:plone:3.1.7
  • Plone » Plone » Version: 3.2
    cpe:2.3:a:plone:plone:3.2
  • Plone » Plone » Version: 3.2.1
    cpe:2.3:a:plone:plone:3.2.1
  • Plone » Plone » Version: 3.2.2
    cpe:2.3:a:plone:plone:3.2.2
  • Plone » Plone » Version: 3.2.3
    cpe:2.3:a:plone:plone:3.2.3
  • Plone » Plone » Version: 3.3
    cpe:2.3:a:plone:plone:3.3
  • Plone » Plone » Version: 3.3.1
    cpe:2.3:a:plone:plone:3.3.1
  • Plone » Plone » Version: 3.3.2
    cpe:2.3:a:plone:plone:3.3.2
  • Plone » Plone » Version: 3.3.3
    cpe:2.3:a:plone:plone:3.3.3
  • Plone » Plone » Version: 3.3.4
    cpe:2.3:a:plone:plone:3.3.4
  • Plone » Plone » Version: 3.3.5
    cpe:2.3:a:plone:plone:3.3.5
  • Plone » Plone » Version: 4.0
    cpe:2.3:a:plone:plone:4.0
  • Plone » Plone » Version: 4.0.1
    cpe:2.3:a:plone:plone:4.0.1
  • Plone » Plone » Version: 4.0.2
    cpe:2.3:a:plone:plone:4.0.2
  • Plone » Plone » Version: 4.0.3
    cpe:2.3:a:plone:plone:4.0.3
  • Plone » Plone » Version: 4.0.4
    cpe:2.3:a:plone:plone:4.0.4
  • Plone » Plone » Version: 4.0.5
    cpe:2.3:a:plone:plone:4.0.5
  • Plone » Plone » Version: 4.0.6.1
    cpe:2.3:a:plone:plone:4.0.6.1
  • Plone » Plone » Version: 4.1
    cpe:2.3:a:plone:plone:4.1
  • Plone » Plone » Version: 4.2
    cpe:2.3:a:plone:plone:4.2
  • Plone » Plone » Version: 4.2.1
    cpe:2.3:a:plone:plone:4.2.1
  • Plone » Plone » Version: 4.2.2
    cpe:2.3:a:plone:plone:4.2.2
  • Plone » Plone » Version: 4.2.3
    cpe:2.3:a:plone:plone:4.2.3
  • Plone » Plone » Version: 4.2.4
    cpe:2.3:a:plone:plone:4.2.4
  • Plone » Plone » Version: 4.2.5
    cpe:2.3:a:plone:plone:4.2.5
  • Plone » Plone » Version: 4.3
    cpe:2.3:a:plone:plone:4.3
  • Plone » Plone » Version: 4.3.1
    cpe:2.3:a:plone:plone:4.3.1


Contact Us

Shodan ® - All rights reserved