Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2015-1592

Опубликовано: 19 фев. 2015
Источник: debian
EPSS Высокий

Описание

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
movabletype-opensourceremovedpackage
movabletype-opensourceend-of-lifesqueezepackage

Примечания

  • https://movabletype.org/news/2015/02/movable_type_607_and_5212_released_to_close_security_vulnera.html

  • https://www.openwall.com/lists/oss-security/2015/02/12/2

EPSS

Процентиль: 99%
0.81049
Высокий

Связанные уязвимости

ubuntu
почти 11 лет назад

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

nvd
почти 11 лет назад

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

github
больше 3 лет назад

Movable Type Pro, Open Source, and Advanced before 5.2.12 and Pro and Advanced 6.0.x before 6.0.7 does not properly use the Perl Storable::thaw function, which allows remote attackers to include and execute arbitrary local Perl files and possibly execute arbitrary code via unspecified vectors.

EPSS

Процентиль: 99%
0.81049
Высокий