Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
geeklog geeklog 1.3.9 sr1 vulnerabilities and exploits
(subscribe to this query)
10
CVSSv2
CVE-2006-1069
Unspecified vulnerability in the session handling for Geeklog 1.4.x prior to 1.4.0sr2, 1.3.11 prior to 1.3.11sr5, 1.3.9 prior to 1.3.9sr5, and possibly earlier versions allows malicious users to gain privileges as arbitrary users via unknown vectors.
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.3.9 Sr1
Geeklog Geeklog 1.3.11 Sr1
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr3
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.11
7.5
CVSSv2
CVE-2005-4725
Geeklog prior to 1.3.11sr3 allows remote malicious users to bypass intended access restrictions and comment on an arbitrary story or topic by guessing the story ID.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr3
Geeklog Geeklog 1.3.11 Rc1
Geeklog Geeklog 1.3.8 1 Sr4
Geeklog Geeklog 1.3.9 Sr1
Geeklog Geeklog 1.3.11 Sr1
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.10 Rc1
7.8
CVSSv2
CVE-2006-2698
Geeklog 1.4.0sr2 and previous versions allows remote malicious users to obtain the full installation path via a direct request and possibly invalid arguments to (1) layout/professional/functions.php or (2) getimage.php.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
6.8
CVSSv2
CVE-2006-2699
Cross-site scripting (XSS) vulnerability in getimage.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to inject arbitrary HTML or web script via the image argument in a show action.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
1 EDB exploit
5.1
CVSSv2
CVE-2006-2700
SQL injection vulnerability in admin/auth.inc.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the loginname parameter.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
7.5
CVSSv2
CVE-2006-2701
SQL injection vulnerability in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands via unknown vectors related to story submission.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
7.5
CVSSv2
CVE-2005-2152
SQL injection vulnerability in Geeklog prior to 1.3.11 allows remote malicious users to execute arbitrary SQL commands via user comments for an article.
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.8 1 Sr3
Geeklog Geeklog 1.3.7 Sr3
Geeklog Geeklog 1.3.8 1 Sr4
Geeklog Geeklog 1.3.9 Sr1
Geeklog Geeklog 1.3.7 Sr1
Geeklog Geeklog 1.3.9 Sr3
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.7 Sr4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-23692
malicious code
XML injection
CVE-2024-28020
CVE-2024-35252
CVE-2024-5833
CVE-2024-30066
injection
CVE-2024-23282
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started