Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) prior to 4.23 allow remote malicious users to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
sixapart movable type 3.33 |
||
sixapart movable type 3.16 |
||
sixapart movable type 3.15 |
||
sixapart movable type 3.01d |
||
sixapart movable type 3.32 |
||
sixapart movable type 3.3 |
||
sixapart movable type 3.14 |
||
sixapart movable type 3.35 |
||
sixapart movable type 3.11 |
||
sixapart movable type 3.17 |
||
sixapart movable type 3.34 |
||
sixapart movable type 3.1 |
||
sixapart movable type 3.0d |
||
sixapart movable type 3.2 |
||
sixapart movable type 3.12 |
||
sixapart movable type |
||
sixapart movable type 4.2 |