CVE-2017-8762
- EPSS 0.32%
- Veröffentlicht 03.05.2017 22:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
GeniXCMS 1.0.2 has XSS triggered by an authenticated user who submits a page, as demonstrated by a crafted oncut attribute in a B element.
CVE-2017-8388
- EPSS 0.43%
- Veröffentlicht 01.05.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
GeniXCMS 1.0.2 allows remote attackers to bypass the alertDanger MSG_USER_EMAIL_EXIST protection mechanism via a register.php?act=edit&id=1 request.
CVE-2017-8377
- EPSS 0.45%
- Veröffentlicht 01.05.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
GeniXCMS 1.0.2 has SQL Injection in inc/lib/Control/Backend/menus.control.php via the menuid parameter.
CVE-2017-8376
- EPSS 0.32%
- Veröffentlicht 01.05.2017 16:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
GeniXCMS 1.0.2 has XSS triggered by an authenticated comment that is mishandled during a mouse operation by an administrator.
CVE-2017-5346
- EPSS 1.08%
- Veröffentlicht 12.01.2017 06:59:00
- Zuletzt bearbeitet 20.04.2025 01:37:25
SQL injection vulnerability in inc/lib/Control/Backend/posts.control.php in GeniXCMS 0.0.8 allows remote authenticated administrators to execute arbitrary SQL commands via the id parameter to gxadmin/index.php.
CVE-2016-10096
- EPSS 0.5%
- Veröffentlicht 01.01.2017 19:59:00
- Zuletzt bearbeitet 12.04.2025 10:46:40
SQL injection vulnerability in register.php in GeniXCMS before 1.0.0 allows remote attackers to execute arbitrary SQL commands via the activation parameter.
CVE-2015-2679
- EPSS 8.34%
- Veröffentlicht 23.03.2015 16:59:07
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple SQL injection vulnerabilities in MetalGenix GeniXCMS before 0.0.2 allow remote attackers to execute arbitrary SQL commands via the (1) page parameter to index.php or (2) username parameter to gxadmin/login.php.
CVE-2015-2678
- EPSS 14.56%
- Veröffentlicht 23.03.2015 16:59:05
- Zuletzt bearbeitet 12.04.2025 10:46:40
Multiple cross-site scripting (XSS) vulnerabilities in MetalGenix GeniXCMS before 0.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) cat parameter in the categories page to gxadmin/index.php or (2) page parameter to index...