Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
sixapart movable type 6.0.7 vulnerabilities and exploits
(subscribe to this query)
755
VMScore
CVE-2015-1592
Movable Type Pro, Open Source, and Advanced prior to 5.2.12 and Pro and Advanced 6.0.x prior to 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote malicious users to include and execute arbitrary local Perl files and possibly execute arbitrary code ...
Debian Debian Linux 7.0
Sixapart Movable Type
1 EDB exploit
668
VMScore
CVE-2016-5742
SQL injection vulnerability in the XML-RPC interface in Movable Type Pro and Advanced 6.x prior to 6.1.3 and 6.2.x prior to 6.2.6 and Movable Type Open Source 5.2.13 and previous versions allows remote malicious users to execute arbitrary SQL commands via unspecified vectors.
Sixapart Movable Type 6.1.1
Sixapart Movable Type 6.1.0
Sixapart Movable Type 6.0.8
Sixapart Movable Type 6.0.1
Sixapart Movable Type 6.0
Sixapart Movable Type 6.0.7
Sixapart Movable Type 6.2.4
Sixapart Movable Type 6.2.2
Sixapart Movable Type 6.0.5
Sixapart Movable Type 6.0.4
Sixapart Movable Type 6.2.0
Sixapart Movable Type 6.1.2
Sixapart Movable Type 6.0.3
Sixapart Movable Type 6.0.2
Sixapart Movable Type Open Source
Sixapart Movable Type 6.0.6
668
VMScore
CVE-2015-0845
Format string vulnerability in Movable Type Pro, Open Source, and Advanced prior to 5.2.13 and Pro and Advanced 6.0.x prior to 6.0.8 allows remote malicious users to execute arbitrary code via vectors related to localization of templates.
Sixapart Movabletype 6.0.2
Sixapart Movabletype 6.0.3
Sixapart Movabletype 6.0.4
Sixapart Movabletype 6.0.5
Sixapart Movabletype 6.0
Sixapart Movabletype 6.0.1
Sixapart Movabletype
Sixapart Movabletype 6.0.6
Sixapart Movabletype 6.0.7
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33572
CVE-2024-24919
CVE-2024-0230
CVE-2024-32714
HTML injection
local file inclusion
CVE-2024-31098
CVE-2024-31244
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started