Total
7 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-2018-6470 | 2 Apple, Nibbleblog | 2 Macos, Nibbleblog | 2021-09-08 | 5.0 MEDIUM | 5.3 MEDIUM |
Nibbleblog 4.0.5 on macOS defaults to having .DS_Store in each directory, causing DS_Store information to leak. | |||||
CVE-2020-23356 | 1 Nibbleblog | 1 Nibbleblog | 2021-07-21 | 5.0 MEDIUM | 7.5 HIGH |
dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters. | |||||
CVE-2019-7719 | 1 Nibbleblog | 1 Nibbleblog | 2019-02-11 | 7.5 HIGH | 9.8 CRITICAL |
Nibbleblog 4.0.5 allows eval injection by placing PHP code in the install.php username parameter and then making a content/private/shadow.php request. | |||||
CVE-2018-16604 | 1 Nibbleblog | 1 Nibbleblog | 2018-11-14 | 6.5 MEDIUM | 7.2 HIGH |
An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}"). | |||||
CVE-2014-8996 | 1 Nibbleblog | 1 Nibbleblog | 2017-09-07 | 4.3 MEDIUM | N/A |
Multiple cross-site scripting (XSS) vulnerabilities in Nibbleblog before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) author_name or (2) content parameter to index.php. | |||||
CVE-2015-6966 | 1 Nibbleblog | 1 Nibbleblog | 2015-09-17 | 6.8 MEDIUM | N/A |
Multiple cross-site request forgery (CSRF) vulnerabilities in Nibbleblog before 4.0.5 allow remote attackers to hijack the authentication of administrators for requests that (1) create a post via a new_simple action to admin.php or (2) conduct cross-site scripting (XSS) attacks via the content parameter in a new_simple action to admin.php. | |||||
CVE-2015-6967 | 1 Nibbleblog | 1 Nibbleblog | 2015-09-17 | 6.5 MEDIUM | N/A |
Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php. |