Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
geeklog geeklog 1.3 vulnerabilities and exploits
(subscribe to this query)
4.3
CVSSv2
CVE-2011-5159
Cross-site scripting (XSS) vulnerability in admin/configuration.php in Geeklog prior to 1.7.1sr1 allows remote malicious users to inject arbitrary web script or HTML via the sub_group parameter, a different vulnerability than CVE-2011-4942.
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.35
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.5.0
Geeklog Geeklog
Geeklog Geeklog 1.3
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.5.2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.5.1
4.3
CVSSv2
CVE-2011-4942
Multiple cross-site scripting (XSS) vulnerabilities in admin/configuration.php in Geeklog prior to 1.7.1sr1 allow remote malicious users to inject arbitrary web script or HTML via the (1) subgroup or (2) conf_group parameters. NOTE: this vulnerability might require a user-assiste...
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.5.0
Geeklog Geeklog 1.5.1
Geeklog Geeklog 1.5.2
Geeklog Geeklog 1.3
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5
Geeklog Geeklog
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.3.9
7.2
CVSSv2
CVE-2002-0096
The installation of Geeklog 1.3 creates an extra group_assignments record which is not properly deleted, which causes the first newly created user to be added to the GroupAdmin and UserAdmin groups, which could provide that user with administrative privileges that were not intend...
Geeklog Geeklog 1.3
7.5
CVSSv2
CVE-2002-0097
Geeklog 1.3 allows remote malicious users to hijack user accounts, including the administrator account, by modifying the UID of a user's permanent cookie to the target account.
Geeklog Geeklog 1.3
7.8
CVSSv2
CVE-2006-2698
Geeklog 1.4.0sr2 and previous versions allows remote malicious users to obtain the full installation path via a direct request and possibly invalid arguments to (1) layout/professional/functions.php or (2) getimage.php.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11 Rc1
Geeklog Geeklog 1.3.11 Sr1
6.8
CVSSv2
CVE-2006-2699
Cross-site scripting (XSS) vulnerability in getimage.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to inject arbitrary HTML or web script via the image argument in a show action.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11 Rc1
1 EDB exploit
5.1
CVSSv2
CVE-2006-2700
SQL injection vulnerability in admin/auth.inc.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the loginname parameter.
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
7.5
CVSSv2
CVE-2006-2701
SQL injection vulnerability in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands via unknown vectors related to story submission.
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.5 Sr1
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.10 Rc1
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.7 Sr4
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.11 Rc1
5
CVSSv2
CVE-2005-4026
search.php in Geeklog 1.4.x prior to 1.4.0rc1, and 1.3.x prior to 1.3.11sr3, allows remote malicious users to obtain sensitive information via invalid (1) datestart and (2) dateend parameters, which leaks the web server path in an error message.
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.4.0
Geeklog Geeklog
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
remote code execution
CVE-2024-34909
CVE-2024-3317
SSTI
CVE-2024-3400
CVE-2024-30051
wireless
CVE-2024-4622
CVE-2024-4908
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started