Логотип exploitDog
bind:CVE-2018-16604
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-16604

Количество 2

Количество 2

nvd логотип

CVE-2018-16604

больше 7 лет назад

An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-q7mm-h7vg-6554

больше 3 лет назад

An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").

CVSS3: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2018-16604

An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").

CVSS3: 7.2
1%
Низкий
больше 7 лет назад
github логотип
GHSA-q7mm-h7vg-6554

An issue was discovered in Nibbleblog v4.0.5. With an admin's username and password, an attacker can execute arbitrary PHP code by changing the username because the username is surrounded by double quotes (e.g., "${phpinfo()}").

CVSS3: 7.2
1%
Низкий
больше 3 лет назад

Уязвимостей на страницу