SQL injection vulnerability in Geeklog prior to 1.3.11 allows remote malicious users to execute arbitrary SQL commands via user comments for an article.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
geeklog geeklog 1.3.8_1 |
||
geeklog geeklog 1.3.8_1_sr1 |
||
geeklog geeklog 1.3.8_1_sr2 |
||
geeklog geeklog 1.3.8_1_sr3 |
||
geeklog geeklog 1.3.6 |
||
geeklog geeklog 1.3.7 |
||
geeklog geeklog 1.3.7_sr1 |
||
geeklog geeklog 1.3.7_sr2 |
||
geeklog geeklog 1.3.9_sr2 |
||
geeklog geeklog 1.3.9_sr3 |
||
geeklog geeklog 1.3.10 |
||
geeklog geeklog 1.3.7_sr3 |
||
geeklog geeklog 1.3.7_sr5 |
||
geeklog geeklog 1.3.8_1_sr5 |
||
geeklog geeklog 1.3.9_sr1 |
||
geeklog geeklog 1.3.7_sr4 |
||
geeklog geeklog 1.3.8 |
||
geeklog geeklog 1.3.8_1_sr4 |
||
geeklog geeklog 1.3.8_1_sr6 |