Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
geeklog geeklog 1.3 vulnerabilities and exploits
(subscribe to this query)
383
VMScore
CVE-2011-4942
Multiple cross-site scripting (XSS) vulnerabilities in admin/configuration.php in Geeklog prior to 1.7.1sr1 allow remote malicious users to inject arbitrary web script or HTML via the (1) subgroup or (2) conf_group parameters. NOTE: this vulnerability might require a user-assiste...
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.5.0
Geeklog Geeklog 1.5.1
Geeklog Geeklog 1.5.2
Geeklog Geeklog 1.3
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5
Geeklog Geeklog
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.3.9
383
VMScore
CVE-2011-5159
Cross-site scripting (XSS) vulnerability in admin/configuration.php in Geeklog prior to 1.7.1sr1 allows remote malicious users to inject arbitrary web script or HTML via the sub_group parameter, a different vulnerability than CVE-2011-4942.
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.35
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.5.0
Geeklog Geeklog
Geeklog Geeklog 1.3
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.5.2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.5.1
641
VMScore
CVE-2002-0096
The installation of Geeklog 1.3 creates an extra group_assignments record which is not properly deleted, which causes the first newly created user to be added to the GroupAdmin and UserAdmin groups, which could provide that user with administrative privileges that were not intend...
Geeklog Geeklog 1.3
668
VMScore
CVE-2002-0097
Geeklog 1.3 allows remote malicious users to hijack user accounts, including the administrator account, by modifying the UID of a user's permanent cookie to the target account.
Geeklog Geeklog 1.3
668
VMScore
CVE-2006-2701
SQL injection vulnerability in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands via unknown vectors related to story submission.
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.11 Rc1
685
VMScore
CVE-2006-2699
Cross-site scripting (XSS) vulnerability in getimage.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to inject arbitrary HTML or web script via the image argument in a show action.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11 Rc1
1 EDB exploit
454
VMScore
CVE-2006-2700
SQL injection vulnerability in admin/auth.inc.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the loginname parameter.
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
694
VMScore
CVE-2006-2698
Geeklog 1.4.0sr2 and previous versions allows remote malicious users to obtain the full installation path via a direct request and possibly invalid arguments to (1) layout/professional/functions.php or (2) getimage.php.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11 Rc1
Geeklog Geeklog 1.3.11 Sr1
445
VMScore
CVE-2005-4026
search.php in Geeklog 1.4.x prior to 1.4.0rc1, and 1.3.x prior to 1.3.11sr3, allows remote malicious users to obtain sensitive information via invalid (1) datestart and (2) dateend parameters, which leaks the web server path in an error message.
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.4.0
Geeklog Geeklog
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
encryption
CVE-2024-4331
CVE-2024-26925
arbitrary code
CVE-2006-4304
CVE-2024-25458
CVE-2024-27077
reflected XSS
CVE-2024-4059
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started