[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249461

 
 

909

 
 

195508

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-3183-1 movabletype-opensource -- movabletype-opensource

ID: oval:org.secpod.oval:def:601985Date: (C)2015-03-20   (M)2021-06-02
Class: PATCHFamily: unix




Multiple vulnerabilities have been discovered in Movable Type, a blogging system. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2013-2184 Unsafe use of Storable::thaw in the handling of comments to blog posts could allow remote attackers to include and execute arbitrary local Perl files or possibly remotely execute arbitrary code. CVE-2014-9057 Netanel Rubin from Check Point Software Technologies discovered a SQL injection vulnerability in the XML-RPC interface allowing remote attackers to execute arbitrary SQL commands. CVE-2015-1592 The Perl Storable::thaw function is not properly used, allowing remote attackers to include and execute arbitrary local Perl files and possibly remotely execute arbitrary code.

Platform:
Debian 7.0
Product:
movabletype-opensource
Reference:
DSA-3183-1
CVE-2013-2184
CVE-2014-9057
CVE-2015-1592
CVE    3
CVE-2014-9057
CVE-2013-2184
CVE-2015-1592
CPE    2
cpe:/o:debian:debian_linux:7.x
cpe:/a:movabletype:movabletype-opensource

© SecPod Technologies