8.5

CVE-2012-5493

gtbn.py in Plone before 4.2.3 and 4.3 before beta 1 allows remote authenticated users with certain permissions to bypass the Python sandbox and execute arbitrary Python code via unspecified vectors.

Data is provided by the National Vulnerability Database (NVD)
PlonePlone Version <= 4.2.2
PlonePlone Version1.0
PlonePlone Version1.0.1
PlonePlone Version1.0.2
PlonePlone Version1.0.3
PlonePlone Version1.0.4
PlonePlone Version1.0.5
PlonePlone Version1.0.6
PlonePlone Version2.0
PlonePlone Version2.0.1
PlonePlone Version2.0.2
PlonePlone Version2.0.3
PlonePlone Version2.0.4
PlonePlone Version2.0.5
PlonePlone Version2.1
PlonePlone Version2.1.1
PlonePlone Version2.1.2
PlonePlone Version2.1.3
PlonePlone Version2.1.4
PlonePlone Version2.5
PlonePlone Version2.5.1
PlonePlone Version2.5.2
PlonePlone Version2.5.3
PlonePlone Version2.5.4
PlonePlone Version2.5.5
PlonePlone Version3.0
PlonePlone Version3.0.1
PlonePlone Version3.0.2
PlonePlone Version3.0.3
PlonePlone Version3.0.4
PlonePlone Version3.0.5
PlonePlone Version3.0.6
PlonePlone Version3.1
PlonePlone Version3.1.1
PlonePlone Version3.1.2
PlonePlone Version3.1.3
PlonePlone Version3.1.4
PlonePlone Version3.1.5.1
PlonePlone Version3.1.6
PlonePlone Version3.1.7
PlonePlone Version3.2
PlonePlone Version3.2.1
PlonePlone Version3.2.2
PlonePlone Version3.2.3
PlonePlone Version3.3
PlonePlone Version3.3.1
PlonePlone Version3.3.2
PlonePlone Version3.3.3
PlonePlone Version3.3.4
PlonePlone Version3.3.5
PlonePlone Version4.0
PlonePlone Version4.0.1
PlonePlone Version4.0.2
PlonePlone Version4.0.3
PlonePlone Version4.0.4
PlonePlone Version4.0.5
PlonePlone Version4.0.6.1
PlonePlone Version4.1
PlonePlone Version4.1.4
PlonePlone Version4.1.5
PlonePlone Version4.1.6
PlonePlone Version4.2
PlonePlone Version4.2 Updatea1
PlonePlone Version4.2 Updatea2
PlonePlone Version4.2 Updateb1
PlonePlone Version4.2 Updateb2
PlonePlone Version4.2 Updaterc1
PlonePlone Version4.2 Updaterc2
PlonePlone Version4.2.0.1
PlonePlone Version4.2.1
PlonePlone Version4.2.1.1
PlonePlone Version4.3
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.49% 0.628
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.5 6.8 10
AV:N/AC:M/Au:S/C:C/I:C/A:C
CWE-94 Improper Control of Generation of Code ('Code Injection')

The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.