Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
geeklog geeklog 1.4.0 beta1 vulnerabilities and exploits
(subscribe to this query)
515
VMScore
CVE-2006-6225
Multiple PHP remote file inclusion vulnerabilities in GeekLog 1.4 allow remote malicious users to execute arbitrary code via a URL in the _CONF[path] parameter to (1) links/functions.inc, (2) polls/functions.inc, (3) spamx/BlackList.Examine.class.php, (4) spamx/DeleteComment.Acti...
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.4.0 Sr2
Geeklog Geeklog 1.4.0 Sr3
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Sr4
1 EDB exploit
685
VMScore
CVE-2006-2699
Cross-site scripting (XSS) vulnerability in getimage.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to inject arbitrary HTML or web script via the image argument in a show action.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
1 EDB exploit
694
VMScore
CVE-2006-2698
Geeklog 1.4.0sr2 and previous versions allows remote malicious users to obtain the full installation path via a direct request and possibly invalid arguments to (1) layout/professional/functions.php or (2) getimage.php.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
454
VMScore
CVE-2006-2700
SQL injection vulnerability in admin/auth.inc.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the loginname parameter.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
668
VMScore
CVE-2006-2701
SQL injection vulnerability in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands via unknown vectors related to story submission.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2018-25103
CVE-2024-36279
CVE-2024-38457
elevation of privilege
CVE-2024-27801
CVE-2024-30103
NULL pointer dereference
CVE-2024-6057
XML injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started