Lucene search

K
NibbleblogNibbleblog

7 matches found

CVE
CVE
added 2021/01/27 4:15 p.m.88 views

CVE-2020-23356

dmin/kernel/api/login.class.phpin in nibbleblog v3.7.1c allows type juggling for login bypass because == is used instead of === for password hashes, which mishandles hashes that begin with 0e followed by exclusively numerical characters.

7.5CVSS7.7AI score0.00237EPSS
CVE
CVE
added 2018/02/01 1:29 p.m.66 views

CVE-2018-6470

Nibbleblog 4.0.5 on macOS defaults to having .DS_Store in each directory, causing DS_Store information to leak.

5.3CVSS4.9AI score0.00232EPSS
CVE
CVE
added 2015/09/16 2:59 p.m.52 views

CVE-2015-6967

Unrestricted file upload vulnerability in the My Image plugin in Nibbleblog before 4.0.5 allows remote administrators to execute arbitrary code by uploading a file with an executable extension, then accessing it via a direct request to the file in content/private/plugins/my_image/image.php.

6.5CVSS7.9AI score0.86769EPSS
CVE
CVE
added 2015/09/16 2:59 p.m.42 views

CVE-2015-6966

Multiple cross-site request forgery (CSRF) vulnerabilities in Nibbleblog before 4.0.5 allow remote attackers to hijack the authentication of administrators for requests that (1) create a post via a new_simple action to admin.php or (2) conduct cross-site scripting (XSS) attacks via the content para...

6.8CVSS6.6AI score0.00132EPSS
CVE
CVE
added 2018/09/06 4:29 p.m.35 views

CVE-2018-16604

An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").

7.2CVSS7.3AI score0.00506EPSS
CVE
CVE
added 2014/11/20 1:55 p.m.32 views

CVE-2014-8996

Multiple cross-site scripting (XSS) vulnerabilities in Nibbleblog before 4.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) author_name or (2) content parameter to index.php.

4.3CVSS5.9AI score0.00305EPSS
CVE
CVE
added 2019/02/11 4:29 a.m.27 views

CVE-2019-7719

Nibbleblog 4.0.5 allows eval injection by placing PHP code in the install.php username parameter and then making a content/private/shadow.php request.

9.8CVSS9.6AI score0.00513EPSS