Movable Type Multiple SQL Injection and Command Injection Vulnerabilities

Attackers can exploit these issues using a browser or readily available tools.

The following exploit code is available:


 

Privacy Statement
Copyright 2010, SecurityFocus