Genixcms
Sign in to watchby Genixcms
CVEs (14)
| CVE | Sev | Risk | CVSS | EPSS | KEV | Published | Description |
|---|---|---|---|---|---|---|---|
| CVE-2017-14764 | Hig | 0.57 | 8.8 | 0.01 | Sep 27, 2017 | In the Upload Modules page in GeniXCMS 1.1.4, remote authenticated users can execute arbitrary PHP code via a .php file in a ZIP archive of a module. | |
| CVE-2017-8827 | Cri | 0.52 | 9.1 | 0.00 | May 8, 2017 | forgotpassword.php in GeniXCMS 1.0.2 lacks a rate limit, which might allow remote attackers to cause a denial of service (login inability) or possibly conduct Arbitrary User Password Reset attacks via a series of requests. | |
| CVE-2017-8377 | Hig | 0.50 | 8.8 | 0.00 | May 1, 2017 | GeniXCMS 1.0.2 has SQL Injection in inc/lib/Control/Backend/menus.control.php via the menuid parameter. | |
| CVE-2017-17431 | Med | 0.40 | 6.1 | 0.00 | Dec 5, 2017 | GeniXCMS 1.1.5 has XSS via the from, id, lang, menuid, mod, q, status, term, to, or token parameter. NOTE: this might overlap CVE-2017-14761, CVE-2017-14762, or CVE-2017-14765. | |
| CVE-2017-14765 | Med | 0.40 | 6.1 | 0.00 | Sep 27, 2017 | In GeniXCMS 1.1.4, gxadmin/index.php has XSS via the Menu ID field in a page=menus request. | |
| CVE-2017-14762 | Med | 0.40 | 6.1 | 0.00 | Sep 27, 2017 | In GeniXCMS 1.1.4, /inc/lib/Control/Backend/menus.control.php has XSS via the id parameter. | |
| CVE-2017-14761 | Med | 0.40 | 6.1 | 0.00 | Sep 27, 2017 | In GeniXCMS 1.1.4, /inc/lib/backend/menus.control.php has XSS via the id parameter. | |
| CVE-2017-5346 | Hig | 0.40 | 7.2 | 0.01 | Jan 12, 2017 | SQL injection vulnerability in inc/lib/Control/Backend/posts.control.php in GeniXCMS 0.0.8 allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter to gxadmin/index.php. | |
| CVE-2016-10096 | Hig | 0.40 | 7.3 | 0.01 | Jan 1, 2017 | SQL injection vulnerability in register.php in GeniXCMS before 1.0.0 allows remote attackers to execute arbitrary SQL commands via the activation parameter. | |
| CVE-2017-8762 | Med | 0.28 | 5.4 | 0.00 | May 3, 2017 | GeniXCMS 1.0.2 has XSS triggered by an authenticated user who submits a page, as demonstrated by a crafted oncut attribute in a B element. | |
| CVE-2017-8376 | Med | 0.28 | 5.4 | 0.00 | May 1, 2017 | GeniXCMS 1.0.2 has XSS triggered by an authenticated comment that is mishandled during a mouse operation by an administrator. | |
| CVE-2017-14231 | Med | 0.27 | 5.3 | 0.01 | Sep 10, 2017 | GeniXCMS before 1.1.0 allows remote attackers to cause a denial of service (account blockage) by leveraging the mishandling of certain username substring relationships, such as the admin<script> username versus the admin username, related to register.php, User.class.php, and Type.class.php. | |
| CVE-2017-8388 | Med | 0.27 | 5.3 | 0.00 | May 1, 2017 | GeniXCMS 1.0.2 allows remote attackers to bypass the alertDanger MSG_USER_EMAIL_EXIST protection mechanism via a register.php?act=edit&id=1 request. | |
| CVE-2017-8780 | Med | 0.24 | 4.8 | 0.00 | May 4, 2017 | GeniXCMS 1.0.2 has XSS triggered by a comment that is mishandled during a publish operation by an administrator, as demonstrated by a malformed P element. |