Geeeeeeeek
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any Geeeeeeeek product.
RSS Feeds for Geeeeeeeek security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in Geeeeeeeek products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by Geeeeeeeek Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 0 vulnerabilities in Geeeeeeeek. Last year, in 2025 Geeeeeeeek had 1 security vulnerability published. Right now, Geeeeeeeek is on track to have less security vulnerabilities in 2026 than it did last year.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 0 | 0.00 |
| 2025 | 1 | 0.00 |
| 2024 | 3 | 6.87 |
It may take a day or so for new Geeeeeeeek vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Geeeeeeeek Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2025-28100 | Apr 15, 2025 |
SQLi in dingfanzuCMS 1.0 via operateOrder.php id paramA SQL Injection vulnerability in dingfanzuCMS v.1.0 allows a attacker to execute arbitrary code via not filtering the content correctly at the "operateOrder.php" id parameter. |
|
| CVE-2024-50652 | Nov 15, 2024 |
Arbitrary File Upload via avatar in java_shop 1.0A file upload vulnerability in java_shop 1.0 allows attackers to upload arbitrary files by modifying the avatar function. |
|
| CVE-2024-50651 | Nov 15, 2024 |
Incorrect Access Control in java_shop 1.0 (ID Parameter Manipulation)java_shop 1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter. |
|
| CVE-2024-8302 | Aug 29, 2024 |
dingfanzu CMS SQLi via /ajax/chpwd.php manipulating usernameA vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been rated as critical. Affected by this issue is some unknown functionality of the file /ajax/chpwd.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way. |
|