{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-24T18:31:55.161","vulnerabilities":[{"cve":{"id":"CVE-2005-2152","sourceIdentifier":"cve@mitre.org","published":"2005-07-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SQL injection vulnerability in Geeklog before 1.3.11 allows remote attackers to execute arbitrary SQL commands via user comments for an article."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.6:*:*:*:*:*:*:*","matchCriteriaId":"147BFA8A-ADBF-4673-AA7B-EF595EB61A52"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.7:*:*:*:*:*:*:*","matchCriteriaId":"0E851FB8-7812-47B1-BADD-D2899651C37C"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.7_sr1:*:*:*:*:*:*:*","matchCriteriaId":"DBB30D22-4DEF-4DF0-AB46-EE7FA992A634"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.7_sr2:*:*:*:*:*:*:*","matchCriteriaId":"F2935349-9CFD-4BF4-8DBE-7713DECF7DDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.7_sr3:*:*:*:*:*:*:*","matchCriteriaId":"D2685AAF-C3E4-4C1B-A8BA-CA472B0261B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.7_sr4:*:*:*:*:*:*:*","matchCriteriaId":"7364F137-0778-4B63-8422-D1EC162EA506"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.7_sr5:*:*:*:*:*:*:*","matchCriteriaId":"6BDD4DA5-7D47-4D99-9F0C-1D0C8358C137"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8:*:*:*:*:*:*:*","matchCriteriaId":"24B4CA68-D7F0-442F-AB2B-FD092FDE90F0"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1:*:*:*:*:*:*:*","matchCriteriaId":"622E7DFE-186D-4047-B355-0A0A8225BE57"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1_sr1:*:*:*:*:*:*:*","matchCriteriaId":"0EA12BA3-AAED-42D3-965C-85C1D0078044"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1_sr2:*:*:*:*:*:*:*","matchCriteriaId":"A5F1D50F-93C6-4897-A369-7C367B1D544B"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1_sr3:*:*:*:*:*:*:*","matchCriteriaId":"E8A8A7C5-5035-44CF-B688-438AF024CD72"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1_sr4:*:*:*:*:*:*:*","matchCriteriaId":"B80A6B63-4AE5-4A4C-A801-E664F155ABB4"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1_sr5:*:*:*:*:*:*:*","matchCriteriaId":"6FD54CA0-BEA1-4C43-9DB1-F5F4321CC275"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.8_1_sr6:*:*:*:*:*:*:*","matchCriteriaId":"E8FF2F3B-C4A0-4A67-B27D-90F091E75454"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.9_sr1:*:*:*:*:*:*:*","matchCriteriaId":"C00D6C8B-2533-4BC4-93AD-87FFCBDF521A"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.9_sr2:*:*:*:*:*:*:*","matchCriteriaId":"794C8A9D-36BC-4C33-8873-9476804F00B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.9_sr3:*:*:*:*:*:*:*","matchCriteriaId":"9FFB261F-59CE-4C0C-91C2-C094CFB97888"},{"vulnerable":true,"criteria":"cpe:2.3:a:geeklog:geeklog:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"2E811EA8-D4B4-4631-9EA8-E4EB9E845DD8"}]}]}],"references":[{"url":"http://secunia.com/advisories/15914","source":"cve@mitre.org"},{"url":"http://securitytracker.com/id?1014381","source":"cve@mitre.org"},{"url":"http://www.geeklog.net/article.php/geeklog-1.3.11sr1","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.hardened-php.net/advisory-062005.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://secunia.com/advisories/15914","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://securitytracker.com/id?1014381","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.geeklog.net/article.php/geeklog-1.3.11sr1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.hardened-php.net/advisory-062005.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}