Description
|
|
A vulnerability was identified in Geeklog, which may be exploited by remote attackers to execute arbitrary SQL commands. This flaw is due to an unspecified error when processing specially crafted parameters, which may be exploited by remote users to bypass the authentication procedure and conduct SQL injection attacks.
|