CVE-2012-0317
Vulnerability from cvelistv5
Published
2012-03-03 02:00
Modified
2024-08-06 18:23
Severity ?
Summary
Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T18:23:30.608Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html"
          },
          {
            "name": "52138",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/52138"
          },
          {
            "name": "DSA-2423",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2012/dsa-2423"
          },
          {
            "name": "JVNDB-2012-000015",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015"
          },
          {
            "name": "1026738",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1026738"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.movabletype.org/documentation/appendices/release-notes/513.html"
          },
          {
            "name": "JVN#70683217",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN70683217/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2012-02-23T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-01-17T19:57:01",
        "orgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
        "shortName": "jpcert"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html"
        },
        {
          "name": "52138",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/52138"
        },
        {
          "name": "DSA-2423",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2012/dsa-2423"
        },
        {
          "name": "JVNDB-2012-000015",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015"
        },
        {
          "name": "1026738",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1026738"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.movabletype.org/documentation/appendices/release-notes/513.html"
        },
        {
          "name": "JVN#70683217",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN70683217/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "vultures@jpcert.or.jp",
          "ID": "CVE-2012-0317",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html",
              "refsource": "CONFIRM",
              "url": "http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html"
            },
            {
              "name": "52138",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/52138"
            },
            {
              "name": "DSA-2423",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2012/dsa-2423"
            },
            {
              "name": "JVNDB-2012-000015",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015"
            },
            {
              "name": "1026738",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1026738"
            },
            {
              "name": "http://www.movabletype.org/documentation/appendices/release-notes/513.html",
              "refsource": "CONFIRM",
              "url": "http://www.movabletype.org/documentation/appendices/release-notes/513.html"
            },
            {
              "name": "JVN#70683217",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN70683217/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "ede6fdc4-6654-4307-a26d-3331c018e2ce",
    "assignerShortName": "jpcert",
    "cveId": "CVE-2012-0317",
    "datePublished": "2012-03-03T02:00:00",
    "dateReserved": "2012-01-04T00:00:00",
    "dateUpdated": "2024-08-06T18:23:30.608Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2012-0317\",\"sourceIdentifier\":\"vultures@jpcert.or.jp\",\"published\":\"2012-03-03T04:04:57.610\",\"lastModified\":\"2024-11-21T01:34:47.263\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site request forgery (CSRF) vulnerabilities in Movable Type before 4.38, 5.0x before 5.07, and 5.1x before 5.13 allow remote attackers to hijack the authentication of arbitrary users for requests that modify data via the (1) commenting feature or (2) community script.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de falsificaci\u00f3n de petici\u00f3n en sitios cruzados (CSRF) en Movable Type anteriores 4.38, 5.0x anteriores 5.07, y 5.1x anteriores 5.13. Permiten a usuarios remotos secuestrar (hijack) la autenticaci\u00f3n de usuarios aleatorios a trav\u00e9s de las peticiones que modifican datos de (1) la opci\u00f3n de comentarios (\\\"commenting feature\\\") o (2) \\\"community script\\\".\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-352\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:*:*:open_source:*:*:*:*:*\",\"versionEndIncluding\":\"4.37\",\"matchCriteriaId\":\"8F2D1316-CAC7-4E50-A76A-03636377785A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.28:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"BAAD088A-29B4-44B4-BB90-6BEF55428902\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.29:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"6DE4CBB7-14AE-45F4-9170-3C097844E8DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.36:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"CD6E7E17-E69C-43C7-A9E3-1A7339B8BF68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.291:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"320C5974-DA38-443F-9BAF-C60E729D3148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.292:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"7020769D-803A-473A-8F1A-4984F870D6B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.361:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"85FA0AB7-78D6-42DC-83E7-9630BD8EFCD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"A8EF53B9-7E86-40D5-AD18-35B09BD346D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.01:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"46CDB676-CD09-44C4-9E49-0BC32F5EA49A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.1:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"E7179FE9-17D8-48BD-B3EC-A29D4C603A89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.02:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"941F8723-0838-42B9-825B-C85FF01CC35A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.04:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"9733B5E7-7A7E-48D6-9F80-7AF9DFDBD76A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.05:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"A82BFEF5-275A-45E6-B42B-1FB22E278A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.06:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"2433941D-2DC2-4155-93F7-282AD4272334\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.11:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"EF917586-EF61-4E4B-8739-5EDF18CCB364\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.12:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"50529598-338F-4077-ABBF-7CE00E8E7FCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.051:*:open_source:*:*:*:*:*\",\"matchCriteriaId\":\"D9C1C42D-7BC2-428F-B9CB-4BAE2D8E0E5C\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:*:*:enterprise:*:*:*:*:*\",\"versionEndIncluding\":\"4.292\",\"matchCriteriaId\":\"2FB744CC-02DF-46F6-A524-27DBBB3C33BF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.28:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"4A2BA875-0C6E-4AD4-9271-CB31E2B2B072\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.29:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"59DC45AB-BF7F-4817-A0FB-E3EBCA8CB761\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.291:*:enterprise:*:*:*:*:*\",\"matchCriteriaId\":\"B516CE7A-7751-4CE0-8E16-097058A6657D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.1:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"4495F904-41A1-4915-A26D-47DA07F17D74\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.02:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"4D930A60-15BE-43E9-9B76-D0723D9B1E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.04:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"0006333C-7916-4BB3-8698-EE48D62AE67C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.05:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"2F400986-9A21-4C5C-95A7-F5F61D199CC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.06:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"9AAB067E-EF83-4528-A0A4-06821CAEE687\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.11:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"E0A5BFC0-6F5C-48B5-BA97-9D7CA292DB8D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.12:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"3EAC6A53-748D-4CB8-A0BB-AE19B23D1812\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.051:*:advanced:*:*:*:*:*\",\"matchCriteriaId\":\"4E616E4E-6D78-4931-9233-3EED49B1B6AF\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CA6D5B7-BB96-46A9-AD07-F4F744657396\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"8342D067-1B16-463D-838B-D16EF7DDCCBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"91A91FDA-16BD-40A3-A055-1F9F61BC90A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22E7F1C-19D3-4C72-8EC7-E968FDEDA780\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B8D3280-D97B-47C9-8737-8DABCA53C290\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"3089827B-7A32-4EA4-93EC-63B80FF5E690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta6:*:*:*:*:*:*\",\"matchCriteriaId\":\"A929B42C-7C65-4D62-B418-EEEF0C3D0E36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"10D3CF75-84DE-412A-BB7C-1A9889B06D16\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CF07C91-FF25-46AC-B42A-DD6D0F72238E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0C879EF-5E16-49D4-9A6E-21C44C041D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"403A8118-6AFE-4A25-882E-1928B489C80F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"E38527C3-2E6F-4B9A-AF59-39AC2C3F7E9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D197DDAE-00ED-47D5-9F6A-6E15EAE56755\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C628DCF9-7F07-447F-9F1F-636D431BBD18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56195FCE-D933-40C6-A6A3-6AC8CFECA5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B18D123-7449-489B-B3EC-0A72B879D92D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8B70C3-003A-4768-B2B4-486688952BCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.2:rc5:*:*:*:*:*:*\",\"matchCriteriaId\":\"69CAACDD-2304-4F1B-AD36-5F3B06A87551\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FFB18069-B21A-4663-93B2-F055A9D7D78D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.15:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F249491D-31C3-47D9-97B4-84C53E8C90E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.15:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"5BBCAE47-DEB7-41F4-B21E-8E77AA76483A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.15:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4A2B6514-6F27-454A-9CF9-F198438E4B22\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E36DD87F-F918-4BDD-98B7-41527470B838\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B49D8B0-39C9-480B-9471-1846CE5A2142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F909511A-D7B6-4033-AB99-87D6BC5741F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A200E33-641A-41B3-8EB3-E7380B686C8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52311931-CE3A-487B-B153-4066D07F63E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"86ED3B93-8769-4A60-BAE4-C50483254905\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"703EEB4B-4747-45D5-9335-6FD5CB238F13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36E48EE7-3212-406E-80AB-26B0206E97E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.35:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1ADC65FF-B4E8-4346-80DE-647BDC4A4D3C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.36:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8E76C88-E486-4463-BA41-6A08ECC5E214\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"93798CD5-1099-4B6A-9303-6EFD037F5B11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.261:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4905997-E4CE-406D-BE0F-B5E2F87AA177\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.291:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"45A49069-F509-4C30-BC9F-DB1FF7C39294\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.292:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7330A56-5D69-495B-B0E9-A820B70573C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:4.361:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9951EF1D-0D13-4215-9066-C17B352E6C6F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F978B3B9-8300-45A7-BDBD-13C504A1BCCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:beta1:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C0E810B-453A-4C22-A8AF-C8DC83104A56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:beta2:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2F85C7-77AA-4431-8017-7EE66D2216CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:beta3:*:*:*:*:*:*\",\"matchCriteriaId\":\"944DAD7F-2A51-4641-AFE9-5CB6AB957923\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:beta4:*:*:*:*:*:*\",\"matchCriteriaId\":\"45E04B8D-6F13-4D7C-9D99-70718EF82BF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"941AF9C9-341E-4820-8B1C-5D8C5B19861A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"0AB08B1C-C527-4D51-932B-7DAC8D507F47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.0:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"246D565F-5260-4F5E-B766-95BADF16BC59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"59407222-BBBB-468A-8604-A50ED9F40048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.1:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA6CA4D7-E19C-4783-88AC-8F32F2588AE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8790230-BE95-496F-8212-284125FF6376\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF488003-44FA-48F4-8F5A-46B46523E175\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B0A9628-B04F-492D-8158-DE95980CE4E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D910C9B1-15D1-4E8F-8901-25063D26DC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F0627468-9A42-4793-8E20-F22BD433FBAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"995A2AAB-E9C5-4B23-8230-D04F15097909\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8ECAE19-F294-48D8-BD97-B4E01C054E3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE116A08-FD4A-4BC1-A79A-513648931D4C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E704381-8161-4795-A7F5-9E4D8B006C92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.031:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98DC35B2-E679-4049-8A2B-CE2C6F7E6E89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sixapart:movable_type:5.051:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48B948EF-0687-4C14-A8AD-9A3B5E055A1F\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN70683217/index.html\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2423\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.movabletype.org/documentation/appendices/release-notes/513.html\",\"source\":\"vultures@jpcert.or.jp\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/52138\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://www.securitytracker.com/id?1026738\",\"source\":\"vultures@jpcert.or.jp\"},{\"url\":\"http://jvn.jp/en/jp/JVN70683217/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/jvndb/JVNDB-2012-000015\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2012/dsa-2423\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.movabletype.org/2012/02/movable_type_513_507_and_438_security_updates.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.movabletype.org/documentation/appendices/release-notes/513.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/52138\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securitytracker.com/id?1026738\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.