Unspecified vulnerability in the session handling for Geeklog 1.4.x before 1.4.0sr2, 1.3.11 before 1.3.11sr5, 1.3.9 before 1.3.9sr5, and possibly earlier versions allows attackers to gain privileges as arbitrary users via unknown vectors.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Geeklog | Geeklog | 1.3.9 (including) | 1.3.9 (including) |
Geeklog | Geeklog | 1.3.9_sr1 (including) | 1.3.9_sr1 (including) |
Geeklog | Geeklog | 1.3.9_sr2 (including) | 1.3.9_sr2 (including) |
Geeklog | Geeklog | 1.3.9_sr3 (including) | 1.3.9_sr3 (including) |
Geeklog | Geeklog | 1.3.9_sr4 (including) | 1.3.9_sr4 (including) |
Geeklog | Geeklog | 1.3.11 (including) | 1.3.11 (including) |
Geeklog | Geeklog | 1.3.11_sr1 (including) | 1.3.11_sr1 (including) |
Geeklog | Geeklog | 1.3.11_sr2 (including) | 1.3.11_sr2 (including) |
Geeklog | Geeklog | 1.3.11_sr3 (including) | 1.3.11_sr3 (including) |
Geeklog | Geeklog | 1.3.11_sr4 (including) | 1.3.11_sr4 (including) |
Geeklog | Geeklog | 1.4.0 (including) | 1.4.0 (including) |
Geeklog | Geeklog | 1.4.0_sr1 (including) | 1.4.0_sr1 (including) |