Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
geeklog geeklog 1.3.11 sr2 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2006-0823
Multiple SQL injection vulnerabilities in Geeklog 1.4.0 prior to 1.4.0sr1 and 1.3.11 prior to 1.3.11sr4 allow remote malicious users to inject arbitrary SQL commands via the (1) userid variable to users.php or (2) sessid variable to lib-sessions.php.
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.3.11 Sr1
Geeklog Geeklog 1.3.11
1 EDB exploit
7.5
CVSSv2
CVE-2006-0824
Multiple unspecified vulnerabilities in lib-common.php in Geeklog 1.4.0 prior to 1.4.0sr1 and 1.3.11 prior to 1.3.11sr4 allow remote malicious users to include arbitrary local files and execute arbitrary code via (1) absolute paths in unspecified parameters and (2) the language c...
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.3.11 Sr1
Geeklog Geeklog 1.3.11
10
CVSSv2
CVE-2006-1069
Unspecified vulnerability in the session handling for Geeklog 1.4.x prior to 1.4.0sr2, 1.3.11 prior to 1.3.11sr5, 1.3.9 prior to 1.3.9sr5, and possibly earlier versions allows malicious users to gain privileges as arbitrary users via unknown vectors.
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.4.0
Geeklog Geeklog 1.3.9 Sr1
Geeklog Geeklog 1.3.11 Sr1
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Sr3
Geeklog Geeklog 1.3.11 Sr4
Geeklog Geeklog 1.3.11
7.5
CVSSv2
CVE-2005-4725
Geeklog prior to 1.3.11sr3 allows remote malicious users to bypass intended access restrictions and comment on an arbitrary story or topic by guessing the story ID.
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr3
Geeklog Geeklog 1.3.11 Rc1
Geeklog Geeklog 1.3.8 1 Sr4
Geeklog Geeklog 1.3.9 Sr1
Geeklog Geeklog 1.3.11 Sr1
Geeklog Geeklog 1.3.9
Geeklog Geeklog 1.3.9 Rc2
Geeklog Geeklog 1.3.11
Geeklog Geeklog 1.3.10 Rc1
6.8
CVSSv2
CVE-2006-2699
Cross-site scripting (XSS) vulnerability in getimage.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to inject arbitrary HTML or web script via the image argument in a show action.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
1 EDB exploit
7.8
CVSSv2
CVE-2006-2698
Geeklog 1.4.0sr2 and previous versions allows remote malicious users to obtain the full installation path via a direct request and possibly invalid arguments to (1) layout/professional/functions.php or (2) getimage.php.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
7.5
CVSSv2
CVE-2006-2701
SQL injection vulnerability in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands via unknown vectors related to story submission.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
5.1
CVSSv2
CVE-2006-2700
SQL injection vulnerability in admin/auth.inc.php in Geeklog 1.4.0sr2 and previous versions allows remote malicious users to execute arbitrary SQL commands and bypass authentication via the loginname parameter.
Geeklog Geeklog 1.3.5
Geeklog Geeklog 1.3.10 Rc3
Geeklog Geeklog 1.4.0 Sr1
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.10 Rc2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.4.0 Beta1
Geeklog Geeklog 1.3.9 Sr4
Geeklog Geeklog 1.3.11 Sr3
Geeklog Geeklog 1.3.9 Rc3
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.11 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.35
Geeklog Geeklog 1.3.9 Rc1
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
7.5
CVSSv2
CVE-2005-2152
SQL injection vulnerability in Geeklog prior to 1.3.11 allows remote malicious users to execute arbitrary SQL commands via user comments for an article.
Geeklog Geeklog 1.3.8
Geeklog Geeklog 1.3.9 Sr2
Geeklog Geeklog 1.3.6
Geeklog Geeklog 1.3.7 Sr2
Geeklog Geeklog 1.3.7 Sr5
Geeklog Geeklog 1.3.8 1 Sr5
Geeklog Geeklog 1.3.7
Geeklog Geeklog 1.3.10
Geeklog Geeklog 1.3.8 1 Sr2
Geeklog Geeklog 1.3.8 1 Sr6
Geeklog Geeklog 1.3.8 1 Sr1
Geeklog Geeklog 1.3.8 1 Sr3
Geeklog Geeklog 1.3.7 Sr3
Geeklog Geeklog 1.3.8 1 Sr4
Geeklog Geeklog 1.3.9 Sr1
Geeklog Geeklog 1.3.7 Sr1
Geeklog Geeklog 1.3.9 Sr3
Geeklog Geeklog 1.3.8 1
Geeklog Geeklog 1.3.7 Sr4
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
logic flaw
CVE-2024-23692
CVE-2024-26229
CVE-2024-35255
CVE-2024-5835
CVE-2024-5837
XML external entity
dos
CVE-2024-5813
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started