Vulnerabilities > Emlog
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-10-01 | CVE-2020-21014 | Unspecified vulnerability in Emlog 6.0.0 emlog v6.0.0 contains an arbitrary file deletion vulnerability in admin/plugin.php. | 6.5 |
2021-09-15 | CVE-2020-21321 | Cross-Site Request Forgery (CSRF) vulnerability in Emlog 6.0.0 emlog v6.0 contains a Cross-Site Request Forgery (CSRF) via /admin/link.php?action=addlink, which allows attackers to arbitrarily add articles. | 4.3 |
2021-05-24 | CVE-2021-30081 | SQL Injection vulnerability in Emlog 6.0.0 An issue was discovered in emlog 6.0.0stable. | 8.8 |
2021-05-17 | CVE-2020-18194 | Cross-site Scripting vulnerability in Emlog 6.0.0 Cross Site Scripting (XSS) in emlog v6.0.0 allows remote attackers to execute arbitrary code by adding a crafted script as a link to a new blog post. | 6.1 |
2021-05-06 | CVE-2021-31737 | Unrestricted Upload of File with Dangerous Type vulnerability in Emlog 5.3.1/6.0.0 emlog v5.3.1 and emlog v6.0.0 have a Remote Code Execution vulnerability due to upload of database backup file in admin/data.php. | 9.8 |
2021-04-29 | CVE-2021-30227 | Cross-site Scripting vulnerability in Emlog 6.0.0 Cross Site Scripting (XSS) vulnerability in the article comments feature in emlog 6.0. | 6.1 |
2021-04-02 | CVE-2020-21585 | Unrestricted Upload of File with Dangerous Type vulnerability in Emlog 6.0.0 Vulnerability in emlog v6.0.0 allows user to upload webshells via zip plugin module. | 9.8 |
2021-02-08 | CVE-2021-3293 | Unspecified vulnerability in Emlog 5.3.1 emlog v5.3.1 has full path disclosure vulnerability in t/index.php, which allows an attacker to see the path to the webroot/file. | 5.3 |
2019-10-01 | CVE-2019-17073 | Path Traversal vulnerability in Emlog emlog through 6.0.0beta allows remote authenticated users to delete arbitrary files via admin/template.php?action=del&tpl=../ directory traversal. | 6.5 |
2019-09-25 | CVE-2019-16868 | Path Traversal vulnerability in Emlog emlog through 6.0.0beta has an arbitrary file deletion vulnerability via an admin/data.php?action=dell_all_bak request with directory traversal sequences in the bak[] parameter. | 9.8 |