CVE-2020-23356
- EPSS 0.24%
- Veröffentlicht 27.01.2021 16:15:12
- Zuletzt bearbeitet 21.11.2024 05:13:46
dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.
CVE-2019-7719
- EPSS 0.51%
- Veröffentlicht 11.02.2019 04:29:00
- Zuletzt bearbeitet 21.11.2024 04:48:34
Nibbleblog 4.0.5 allows eval injection by placing PHP code in the install.php username parameter and then making a content/private/shadow.php request.
CVE-2018-16604
- EPSS 0.51%
- Veröffentlicht 06.09.2018 16:29:05
- Zuletzt bearbeitet 21.11.2024 03:53:02
An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
CVE-2018-6470
- EPSS 0.23%
- Veröffentlicht 01.02.2018 13:29:00
- Zuletzt bearbeitet 21.11.2024 04:10:43
Nibbleblog 4.0.5 on macOS defaults to having .DS_Store in each directory, causing DS_Store information to leak.
CVE-2015-6967
- EPSS 80.76%
- Veröffentlicht 16.09.2015 14:59:09
- Zuletzt bearbeitet 12.04.2025 10:46:40
Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in co...
CVE-2015-6966
- EPSS 0.13%
- Veröffentlicht 16.09.2015 14:59:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple cross-site request forgery (CSRF) vulnerabilities in Nibbleblog before 4.0.5 allow remote attackers to hijack the authentication of administrators for requests that (1) create a post via a new_simple action to admin.php or (2) conduct cross-...
CVE-2014-8996
- EPSS 0.31%
- Veröffentlicht 20.11.2014 13:55:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple cross-site scripting (XSS) vulnerabilities in Nibbleblog before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) author_name or (2) content parameter to index.php.