SQL injection vulnerability in Geeklog before 1.3.11 allows remote attackers to execute arbitrary SQL commands via user comments for an article.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Geeklog | Geeklog | 1.3.6 (including) | 1.3.6 (including) |
Geeklog | Geeklog | 1.3.7 (including) | 1.3.7 (including) |
Geeklog | Geeklog | 1.3.7_sr1 (including) | 1.3.7_sr1 (including) |
Geeklog | Geeklog | 1.3.7_sr2 (including) | 1.3.7_sr2 (including) |
Geeklog | Geeklog | 1.3.7_sr3 (including) | 1.3.7_sr3 (including) |
Geeklog | Geeklog | 1.3.7_sr4 (including) | 1.3.7_sr4 (including) |
Geeklog | Geeklog | 1.3.7_sr5 (including) | 1.3.7_sr5 (including) |
Geeklog | Geeklog | 1.3.8 (including) | 1.3.8 (including) |
Geeklog | Geeklog | 1.3.8_1 (including) | 1.3.8_1 (including) |
Geeklog | Geeklog | 1.3.8_1_sr1 (including) | 1.3.8_1_sr1 (including) |
Geeklog | Geeklog | 1.3.8_1_sr2 (including) | 1.3.8_1_sr2 (including) |
Geeklog | Geeklog | 1.3.8_1_sr3 (including) | 1.3.8_1_sr3 (including) |
Geeklog | Geeklog | 1.3.8_1_sr4 (including) | 1.3.8_1_sr4 (including) |
Geeklog | Geeklog | 1.3.8_1_sr5 (including) | 1.3.8_1_sr5 (including) |
Geeklog | Geeklog | 1.3.8_1_sr6 (including) | 1.3.8_1_sr6 (including) |
Geeklog | Geeklog | 1.3.9_sr1 (including) | 1.3.9_sr1 (including) |
Geeklog | Geeklog | 1.3.9_sr2 (including) | 1.3.9_sr2 (including) |
Geeklog | Geeklog | 1.3.9_sr3 (including) | 1.3.9_sr3 (including) |
Geeklog | Geeklog | 1.3.10 (including) | 1.3.10 (including) |