Total vulnerabilities in the database
SQL injection vulnerability in Geeklog before 1.3.11 allows remote attackers to execute arbitrary SQL commands via user comments for an article.
Software | From | Fixed in |
---|---|---|
geeklog / geeklog | 1.3.8 | 1.3.8.x |
geeklog / geeklog | 1.3.9_sr2 | 1.3.9_sr2.x |
geeklog / geeklog | 1.3.6 | 1.3.6.x |
geeklog / geeklog | 1.3.7_sr2 | 1.3.7_sr2.x |
geeklog / geeklog | 1.3.7_sr5 | 1.3.7_sr5.x |
geeklog / geeklog | 1.3.8_1_sr5 | 1.3.8_1_sr5.x |
geeklog / geeklog | 1.3.7 | 1.3.7.x |
geeklog / geeklog | 1.3.10 | 1.3.10.x |
geeklog / geeklog | 1.3.8_1_sr2 | 1.3.8_1_sr2.x |
geeklog / geeklog | 1.3.8_1_sr6 | 1.3.8_1_sr6.x |
geeklog / geeklog | 1.3.8_1_sr1 | 1.3.8_1_sr1.x |
geeklog / geeklog | 1.3.8_1_sr3 | 1.3.8_1_sr3.x |
geeklog / geeklog | 1.3.7_sr3 | 1.3.7_sr3.x |
geeklog / geeklog | 1.3.8_1_sr4 | 1.3.8_1_sr4.x |
geeklog / geeklog | 1.3.9_sr1 | 1.3.9_sr1.x |
geeklog / geeklog | 1.3.7_sr1 | 1.3.7_sr1.x |
geeklog / geeklog | 1.3.9_sr3 | 1.3.9_sr3.x |
geeklog / geeklog | 1.3.8_1 | 1.3.8_1.x |
geeklog / geeklog | 1.3.7_sr4 | 1.3.7_sr4.x |