Total vulnerabilities in the database
Geeklog before 1.3.11sr3 allows remote attackers to bypass intended access restrictions and comment on an arbitrary story or topic by guessing the story ID.
Software | From | Fixed in |
---|---|---|
geeklog / geeklog | 1.3.10_rc3 | 1.3.10_rc3.x |
geeklog / geeklog | 1.3.9_sr2 | 1.3.9_sr2.x |
geeklog / geeklog | 1.3.10_rc2 | 1.3.10_rc2.x |
geeklog / geeklog | 1.3.9_rc3 | 1.3.9_rc3.x |
geeklog / geeklog | 1.3.11_sr2 | 1.3.11_sr2.x |
geeklog / geeklog | 1.3.9_rc1 | 1.3.9_rc1.x |
geeklog / geeklog | 1.3.10 | 1.3.10.x |
geeklog / geeklog | 1.3.8_1_sr3 | 1.3.8_1_sr3.x |
geeklog / geeklog | 1.3.11_rc1 | 1.3.11_rc1.x |
geeklog / geeklog | 1.3.8_1_sr4 | 1.3.8_1_sr4.x |
geeklog / geeklog | 1.3.9_sr1 | 1.3.9_sr1.x |
geeklog / geeklog | 1.3.11_sr1 | 1.3.11_sr1.x |
geeklog / geeklog | 1.3.9 | 1.3.9.x |
geeklog / geeklog | 1.3.9_rc2 | 1.3.9_rc2.x |
geeklog / geeklog | 1.3.11 | 1.3.11.x |
geeklog / geeklog | 1.3.10_rc1 | 1.3.10_rc1.x |