First published: Tue Dec 16 2014(Updated: )
SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Debian Debian Linux | =7.0 | |
Sixapart Movable Type | <=5.17 | |
Sixapart Movable Type | =5.2 | |
Sixapart Movable Type | =5.2.2 | |
Sixapart Movable Type | =5.2.3 | |
Sixapart Movable Type | =5.2.4 | |
Sixapart Movable Type | =5.2.5 | |
Sixapart Movable Type | =5.2.6 | |
Sixapart Movable Type | =5.2.7 | |
Sixapart Movable Type | =5.2.8 | |
Sixapart Movable Type | =5.2.9 | |
Sixapart Movable Type | =5.2.10 | |
Sixapart Movable Type | =6.0 | |
Sixapart Movable Type | =6.0.1 | |
Sixapart Movable Type | =6.0.2 | |
Sixapart Movable Type | =6.0.3 | |
Sixapart Movable Type | =6.0.4 | |
Sixapart Movable Type | =6.0.5 | |
debian/movabletype-opensource |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.