Zope Object Database (ZODB) before 3.8.2, when certain Zope Enterprise Objects (ZEO) database sharing is enabled, allows remote attackers to bypass authentication via vectors involving the ZEO network protocol.
https://exchange.xforce.ibmcloud.com/vulnerabilities/52379
http://www.vupen.com/english/advisories/2009/2217
http://www.securityfocus.com/bid/35987
http://secunia.com/advisories/36205
http://secunia.com/advisories/36204
http://pypi.python.org/pypi/ZODB3/3.8.2#whats-new-in-zodb-3-8-2
http://mail.zope.org/pipermail/zope-announce/2009-August/002220.html