An issue in Plone CMS v. 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1rc2, 5.1rc1, 5.1b4, 5.1b3, 5.1b2, 5.1a2, 5.1a1, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.2, 5.1.1 5.1, 5.0rc3, 5.0rc2, 5.0rc1, 5.0.9, 5.0.8, 5.0.7, 5.0.6, 5.0.5, 5.0.4, 5.0.3, 5.0.2, 5.0.10, 5.0.1, 5.0, 4.3.9, 4.3.8, 4.3.7, 4.3.6, 4.3.5, 4.3.4, 4.3.3, 4.3.20, 4 allows attacker to access sensitive information via the RSS feed protlet.
{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "4.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.1"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.2"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.3"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.4"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.5"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.6"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.7"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.8"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.9"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.10"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.11"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.12"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.14"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.15"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.17"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.18"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.19"
},
{
"introduced": "0"
},
{
"last_affected": "4.3.20"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-rc1"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-rc2"
},
{
"introduced": "0"
},
{
"last_affected": "5.0-rc3"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.2"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.3"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.4"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.5"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.7"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.8"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.9"
},
{
"introduced": "0"
},
{
"last_affected": "5.0.10"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.1"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.2"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.4"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.5"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.6"
},
{
"introduced": "0"
},
{
"last_affected": "5.1.7"
},
{
"introduced": "0"
},
{
"last_affected": "5.1rc2-NA"
},
{
"introduced": "0"
},
{
"last_affected": "5.2.0"
},
{
"introduced": "0"
},
{
"last_affected": "5.2.1"
},
{
"introduced": "0"
},
{
"last_affected": "5.2.2"
},
{
"introduced": "0"
},
{
"last_affected": "5.2.3"
},
{
"introduced": "0"
},
{
"last_affected": "5.2.4"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1-alpha2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1a1-alpha1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1a2-beta4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1b2-beta3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1b3-beta2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1b4-rc2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.1rc1-rc1"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33926.json"