296,172
Total vulnerabilities in the database
Geeklog before 1.3.11sr3 allows remote attackers to bypass intended access restrictions and comment on an arbitrary story or topic by guessing the story ID.
Software | From | Fixed in |
---|---|---|
geeklog / geeklog | 1.3.10_rc3 | 1.3.10_rc3.x |
geeklog / geeklog | 1.3.9_sr2 | 1.3.9_sr2.x |
geeklog / geeklog | 1.3.10_rc2 | 1.3.10_rc2.x |
geeklog / geeklog | 1.3.9_rc3 | 1.3.9_rc3.x |
geeklog / geeklog | 1.3.11_sr2 | 1.3.11_sr2.x |
geeklog / geeklog | 1.3.9_rc1 | 1.3.9_rc1.x |
geeklog / geeklog | 1.3.10 | 1.3.10.x |
geeklog / geeklog | 1.3.8_1_sr3 | 1.3.8_1_sr3.x |
geeklog / geeklog | 1.3.11_rc1 | 1.3.11_rc1.x |
geeklog / geeklog | 1.3.8_1_sr4 | 1.3.8_1_sr4.x |
geeklog / geeklog | 1.3.9_sr1 | 1.3.9_sr1.x |
geeklog / geeklog | 1.3.11_sr1 | 1.3.11_sr1.x |
geeklog / geeklog | 1.3.9 | 1.3.9.x |
geeklog / geeklog | 1.3.9_rc2 | 1.3.9_rc2.x |
geeklog / geeklog | 1.3.11 | 1.3.11.x |
geeklog / geeklog | 1.3.10_rc1 | 1.3.10_rc1.x |