Plone.app.content

Latest version: v4.1.2

Safety actively analyzes 629564 Python packages for vulnerabilities to keep your Python projects secure.

Scan your dependencies

Page 4 of 19

4.0.0a5

--------------------

Bug fixes:


- Remove cyclic dependency with Products.CMFPlone
[ericof] (232)

4.0.0a4

--------------------

Bug fixes:


- isort, black bode style and pyupgrade [jensens] (231)

4.0.0a3

--------------------

Bug fixes:


- Fixed stored XSS in folder contents.
From the `PloneHotfix20210518 contents fix <https://plone.org/security/hotfix/20210518/stored-xss-in-folder-contents>`_.
[maurits] (3274)
- Fixed stored XSS from user fullname and possibly other places where ``getVocabulary`` is called.
This is an alternative to the ``plone.app.users`` workaround from the `PloneHotfix20210518 fullname fix <https://plone.org/security/hotfix/20210518/stored-xss-from-user-fullname>`_.
It looks like Plone 6 is not vulnerable, but this change makes sure.
[maurits] (3274)

4.0.0a2

--------------------

Bug fixes:


- Call fileUpload view explicit with to avoid possible plone.rest clashes.
[jensens] (225)

4.0.0a1

--------------------

Breaking changes:


- Remove compatibility code for Archetypes and older Python and Plone versions.
This version is only for Plone 6.0.
[maurits] (215)
- Update for Plone 6 with Bootstrap markup
[agitator, jensens] (220)
- Added ``folder_publish`` browser view.
This replaces the ``folder_publish.cpy`` script from ``Products.CMFPlone``.
[maurits] (3057)
- Added ``content_status_modify`` browser view.
This replaces the ``content_status_modify.cpy`` script and its validator ``validate_content_status_modify.vpy`` from ``Products.CMFPlone``.
[maurits] (3057)


Bug fixes:


- Allow to use the getSource view when we are in an add form and we do not have the "Modify portal content" permission (221)

3.8.7

------------------

Bug fixes:


- Fixed deprecation warning for ``IFieldPermissionChecker``.
[maurits] (3130)

Page 4 of 19

© 2024 Safety CLI Cybersecurity Inc. All Rights Reserved.