Cross-site scripting (XSS) vulnerability in an unspecified page template in Plone CMS 5.x through 5.0.6, 4.x through 4.3.11, and 3.3.x through 3.3.6 allows remote attackers to inject arbitrary web script or HTML via unknown vectors.
{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:plone:plone:3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:3.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.1.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.7:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.8:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.9:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.10:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:4.3.11:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:a1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc1:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc2:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0:rc3:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:plone:plone:5.1a1:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "0"
},
{
"last_affected": "3.3"
},
{
"last_affected": "3.3.1"
},
{
"last_affected": "3.3.2"
},
{
"last_affected": "3.3.3"
},
{
"last_affected": "3.3.4"
},
{
"last_affected": "3.3.5"
},
{
"last_affected": "3.3.6"
},
{
"last_affected": "4.0"
},
{
"last_affected": "4.0.1"
},
{
"last_affected": "4.0.2"
},
{
"last_affected": "4.0.3"
},
{
"last_affected": "4.0.4"
},
{
"last_affected": "4.0.5"
},
{
"last_affected": "4.0.7"
},
{
"last_affected": "4.0.8"
},
{
"last_affected": "4.0.9"
},
{
"last_affected": "4.0.10"
},
{
"last_affected": "4.1"
},
{
"last_affected": "4.1.1"
},
{
"last_affected": "4.1.2"
},
{
"last_affected": "4.1.3"
},
{
"last_affected": "4.1.4"
},
{
"last_affected": "4.1.5"
},
{
"last_affected": "4.1.6"
},
{
"last_affected": "4.2"
},
{
"last_affected": "4.2.1"
},
{
"last_affected": "4.2.2"
},
{
"last_affected": "4.2.3"
},
{
"last_affected": "4.2.4"
},
{
"last_affected": "4.2.5"
},
{
"last_affected": "4.2.6"
},
{
"last_affected": "4.2.7"
},
{
"last_affected": "4.3"
},
{
"last_affected": "4.3.1"
},
{
"last_affected": "4.3.2"
},
{
"last_affected": "4.3.3"
},
{
"last_affected": "4.3.4"
},
{
"last_affected": "4.3.5"
},
{
"last_affected": "4.3.6"
},
{
"last_affected": "4.3.7"
},
{
"last_affected": "4.3.8"
},
{
"last_affected": "4.3.9"
},
{
"last_affected": "4.3.10"
},
{
"last_affected": "4.3.11"
},
{
"last_affected": "5.0"
},
{
"last_affected": "5.0-a1"
},
{
"last_affected": "5.0-rc1"
},
{
"last_affected": "5.0-rc2"
},
{
"last_affected": "5.0-rc3"
},
{
"last_affected": "5.0.1"
},
{
"last_affected": "5.0.2"
},
{
"last_affected": "5.0.3"
},
{
"last_affected": "5.0.4"
},
{
"last_affected": "5.0.5"
},
{
"last_affected": "5.0.6"
},
{
"last_affected": "5.1a1"
}
]
}