Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2020-35190

The official plone Docker images before version of 4.3.18-alpine (Alpine specific) contain a blank password for a root user. System using the plone docker container deployed by affected versions of the docker image may allow a remote attacker to achieve root access with a blank password.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.02
EPSS Ranking 82.7%
CVSS Severity
CVSS v3 Score 9.8
CVSS v2 Score 10.0
Products affected by CVE-2020-35190
  • Plone » Plone » Version: 4.0.1
    cpe:2.3:a:plone:plone:4.0.1
  • Plone » Plone » Version: 4.0.10
    cpe:2.3:a:plone:plone:4.0.10
  • Plone » Plone » Version: 4.0.2
    cpe:2.3:a:plone:plone:4.0.2
  • Plone » Plone » Version: 4.0.3
    cpe:2.3:a:plone:plone:4.0.3
  • Plone » Plone » Version: 4.0.4
    cpe:2.3:a:plone:plone:4.0.4
  • Plone » Plone » Version: 4.0.5
    cpe:2.3:a:plone:plone:4.0.5
  • Plone » Plone » Version: 4.0.6
    cpe:2.3:a:plone:plone:4.0.6
  • Plone » Plone » Version: 4.0.6.1
    cpe:2.3:a:plone:plone:4.0.6.1
  • Plone » Plone » Version: 4.0.7
    cpe:2.3:a:plone:plone:4.0.7
  • Plone » Plone » Version: 4.0.8
    cpe:2.3:a:plone:plone:4.0.8
  • Plone » Plone » Version: 4.0.9
    cpe:2.3:a:plone:plone:4.0.9
  • Plone » Plone » Version: 4.1
    cpe:2.3:a:plone:plone:4.1
  • Plone » Plone » Version: 4.1.0
    cpe:2.3:a:plone:plone:4.1.0
  • Plone » Plone » Version: 4.1.1
    cpe:2.3:a:plone:plone:4.1.1
  • Plone » Plone » Version: 4.1.2
    cpe:2.3:a:plone:plone:4.1.2
  • Plone » Plone » Version: 4.1.3
    cpe:2.3:a:plone:plone:4.1.3
  • Plone » Plone » Version: 4.1.4
    cpe:2.3:a:plone:plone:4.1.4
  • Plone » Plone » Version: 4.1.5
    cpe:2.3:a:plone:plone:4.1.5
  • Plone » Plone » Version: 4.1.6
    cpe:2.3:a:plone:plone:4.1.6
  • Plone » Plone » Version: 4.2
    cpe:2.3:a:plone:plone:4.2
  • Plone » Plone » Version: 4.2.0
    cpe:2.3:a:plone:plone:4.2.0
  • Plone » Plone » Version: 4.2.1
    cpe:2.3:a:plone:plone:4.2.1
  • Plone » Plone » Version: 4.2.2
    cpe:2.3:a:plone:plone:4.2.2
  • Plone » Plone » Version: 4.2.3
    cpe:2.3:a:plone:plone:4.2.3
  • Plone » Plone » Version: 4.2.4
    cpe:2.3:a:plone:plone:4.2.4
  • Plone » Plone » Version: 4.2.5
    cpe:2.3:a:plone:plone:4.2.5
  • Plone » Plone » Version: 4.2.6
    cpe:2.3:a:plone:plone:4.2.6
  • Plone » Plone » Version: 4.2.7
    cpe:2.3:a:plone:plone:4.2.7
  • Plone » Plone » Version: 4.3
    cpe:2.3:a:plone:plone:4.3
  • Plone » Plone » Version: 4.3.0
    cpe:2.3:a:plone:plone:4.3.0
  • Plone » Plone » Version: 4.3.1
    cpe:2.3:a:plone:plone:4.3.1
  • Plone » Plone » Version: 4.3.10
    cpe:2.3:a:plone:plone:4.3.10
  • Plone » Plone » Version: 4.3.11
    cpe:2.3:a:plone:plone:4.3.11
  • Plone » Plone » Version: 4.3.12
    cpe:2.3:a:plone:plone:4.3.12
  • Plone » Plone » Version: 4.3.13
    cpe:2.3:a:plone:plone:4.3.13
  • Plone » Plone » Version: 4.3.14
    cpe:2.3:a:plone:plone:4.3.14
  • Plone » Plone » Version: 4.3.15
    cpe:2.3:a:plone:plone:4.3.15
  • Plone » Plone » Version: 4.3.16
    cpe:2.3:a:plone:plone:4.3.16
  • Plone » Plone » Version: 4.3.17
    cpe:2.3:a:plone:plone:4.3.17
  • Plone » Plone » Version: 4.3.18
    cpe:2.3:a:plone:plone:4.3.18
  • Plone » Plone » Version: 4.3.2
    cpe:2.3:a:plone:plone:4.3.2
  • Plone » Plone » Version: 4.3.3
    cpe:2.3:a:plone:plone:4.3.3
  • Plone » Plone » Version: 4.3.4
    cpe:2.3:a:plone:plone:4.3.4
  • Plone » Plone » Version: 4.3.5
    cpe:2.3:a:plone:plone:4.3.5
  • Plone » Plone » Version: 4.3.6
    cpe:2.3:a:plone:plone:4.3.6
  • Plone » Plone » Version: 4.3.7
    cpe:2.3:a:plone:plone:4.3.7
  • Plone » Plone » Version: 4.3.8
    cpe:2.3:a:plone:plone:4.3.8
  • Plone » Plone » Version: 4.3.9
    cpe:2.3:a:plone:plone:4.3.9


Contact Us

Shodan ® - All rights reserved