Page 10 of 52 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

Six Apart Movable Type 3.16 stores account names and password hashes in a cookie, which allows remote attackers to login to an account by sniffing the cookie. • http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html http://www.sixapart.com/movabletype/docs/3.2/h_changelog/3_2.html •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

Six Apart Movable Type 3.16 allows local users with blog-creation privileges to create or overwrite arbitrary files of certain types (such as HTML and image files) by selecting an arbitrary directory as a blog's top-level directory. NOTE: this issue can be used in conjunction with CVE-2005-3102 to create or overwrite arbitrary files of all types. • http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html http://secunia.com/advisories/16899 http://www.securityfocus.com/bid/15302 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The password reset feature in Movable Type before 3.2 generates different error messages depending on whether a user exists or not, which allows remote attackers to determine valid usernames. • http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html http://secunia.com/advisories/16899 http://www.securityfocus.com/bid/14911 •

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

Cross-site scripting (XSS) vulnerability in Movable Type before 3.2 allows remote attackers to inject arbitrary web script or HTML via the (1) title, (2) category, (3) body, (4) extended body, and (5) excerpt form fields in new blog entries. • http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html http://secunia.com/advisories/16899 •

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

The administrative interface in Movable Type allows attackers to upload files with arbitrary extensions under the web root. • http://archives.neohapsis.com/archives/fulldisclosure/2005-11/0091.html http://secunia.com/advisories/16899 •