Vulnerabilities > Sixapart > Movable Type > 2.66

DATE CVE VULNERABILITY TITLE RISK
2023-10-30 CVE-2023-45746 Cross-site Scripting vulnerability in Sixapart Movable Type
Cross-site scripting vulnerability in Movable Type series allows a remote authenticated attacker to inject an arbitrary script.
network
low complexity
sixapart CWE-79
5.4
2018-09-04 CVE-2018-0672 Cross-site Scripting vulnerability in Sixapart Movable Type
Cross-site scripting vulnerability in Movable Type versions prior to Ver.
network
sixapart CWE-79
4.3
2015-03-27 CVE-2013-2184 Code vulnerability in Sixapart Movable Type
Movable Type before 5.2.6 does not properly use the Storable::thaw function, which allows remote attackers to execute arbitrary code via the comment_state parameter.
network
low complexity
sixapart CWE-17
7.5
2014-12-16 CVE-2014-9057 SQL Injection vulnerability in multiple products
SQL injection vulnerability in the XML-RPC interface in Movable Type before 5.18, 5.2.x before 5.2.11, and 6.x before 6.0.6 allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
network
low complexity
debian sixapart CWE-89
7.5
2009-07-16 CVE-2009-2481 Improper Authentication vulnerability in multiple products
mt-wizard.cgi in Six Apart Movable Type before 4.261, when global templates are not initialized, allows remote attackers to bypass access restrictions and (1) send e-mail to arbitrary addresses or (2) obtain sensitive information via unspecified vectors.
5.8
2009-01-05 CVE-2008-5846 Permissions, Privileges, and Access Controls vulnerability in Sixapart Movable Type
Six Apart Movable Type (MT) before 4.23 allows remote authenticated users with create permission for posts to bypass intended access restrictions and publish posts via a "system-wide entry listing screen."
network
low complexity
sixapart CWE-264
4.0
2009-01-05 CVE-2008-5845 Cross-Site Scripting vulnerability in Sixapart Movable Type
Multiple cross-site scripting (XSS) vulnerabilities in Six Apart Movable Type (MT) before 4.23 allow remote attackers to inject arbitrary web script or HTML via a (1) MTEntryAuthorUsername, (2) MTAuthorDisplayName, (3) MTEntryAuthorDisplayName, or (4) MTCommenterName field in a Profile View template; a (5) listing screen or (6) edit screen in the CMS app; (7) a TrackBack title, related to the HTML sanitization library; or (8) a user archive name (aka archive title) on a published Community Blog template.
network
sixapart CWE-79
4.3