Geeeeeeeek Geeeeeeeek

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any Geeeeeeeek product.

RSS Feeds for Geeeeeeeek security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in Geeeeeeeek products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by Geeeeeeeek Sorted by Most Security Vulnerabilities since 2018

Geeeeeeeek Dingfanzu2 vulnerabilities

Geeeeeeeek Java Shop2 vulnerabilities

By the Year

In 2026 there have been 0 vulnerabilities in Geeeeeeeek. Last year, in 2025 Geeeeeeeek had 1 security vulnerability published. Right now, Geeeeeeeek is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 0.00
2024 3 6.87

It may take a day or so for new Geeeeeeeek vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Geeeeeeeek Security Vulnerabilities

CVE Date Vulnerability Products
CVE-2025-28100 Apr 15, 2025
SQLi in dingfanzuCMS 1.0 via operateOrder.php id param A SQL Injection vulnerability in dingfanzuCMS v.1.0 allows a attacker to execute arbitrary code via not filtering the content correctly at the "operateOrder.php" id parameter.
Dingfanzu
CVE-2024-50652 Nov 15, 2024
Arbitrary File Upload via avatar in java_shop 1.0 A file upload vulnerability in java_shop 1.0 allows attackers to upload arbitrary files by modifying the avatar function.
Java Shop
CVE-2024-50651 Nov 15, 2024
Incorrect Access Control in java_shop 1.0 (ID Parameter Manipulation) java_shop 1.0 is vulnerable to Incorrect Access Control, which allows attackers to obtain sensitive information of users with different IDs by modifying the ID parameter.
Java Shop
CVE-2024-8302 Aug 29, 2024
dingfanzu CMS SQLi via /ajax/chpwd.php manipulating username A vulnerability was found in dingfanzu CMS up to 29d67d9044f6f93378e6eb6ff92272217ff7225c. It has been rated as critical. Affected by this issue is some unknown functionality of the file /ajax/chpwd.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.
Dingfanzu
Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.