Vulnerabilities (CVE)

Filtered by vendor Nibbleblog Subscribe
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2020-23356 1 Nibbleblog 1 Nibbleblog 2024-02-04 5.0 MEDIUM 7.5 HIGH
dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.
CVE-2018-16604 1 Nibbleblog 1 Nibbleblog 2024-02-04 6.5 MEDIUM 7.2 HIGH
An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").
CVE-2019-7719 1 Nibbleblog 1 Nibbleblog 2024-02-04 7.5 HIGH 9.8 CRITICAL
Nibbleblog 4.0.5 allows eval injection by placing PHP code in the install.php username parameter and then making a content/private/shadow.php request.
CVE-2018-6470 2 Apple, Nibbleblog 2 Macos, Nibbleblog 2024-02-04 5.0 MEDIUM 5.3 MEDIUM
Nibbleblog 4.0.5 on macOS defaults to having .DS_Store in each directory, causing DS_Store information to leak.
CVE-2015-6967 1 Nibbleblog 1 Nibbleblog 2024-02-04 6.5 MEDIUM N/A
Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php.
CVE-2015-6966 1 Nibbleblog 1 Nibbleblog 2024-02-04 6.8 MEDIUM N/A
Multiple cross-site request forgery (CSRF) vulnerabilities in Nibbleblog before 4.0.5 allow remote attackers to hijack the authentication of administrators for requests that (1) create a post via a new_simple action to admin.php or (2) conduct cross-site scripting (XSS) attacks via the content parameter in a new_simple action to admin.php.
CVE-2014-8996 1 Nibbleblog 1 Nibbleblog 2024-02-04 4.3 MEDIUM N/A
Multiple cross-site scripting (XSS) vulnerabilities in Nibbleblog before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) author_name or (2) content parameter to index.php.