Latest version: v0.3.0
The information on this page was curated by experts in our Cybersecurity Intelligence Team.
A mechanism for bypass Plone security, performing operations normally unauthorized, if a secret token is know (core package)
No known vulnerabilities found