GeniXCMS has an XSS via the from, id, lang, menuid, mod, q, status, term, to, or token parameters.
In GeniXCMS in /inc/lib/backend/menus.control.php has an XSS via the id parameter.
GeniXCMS in /inc/lib/Control/Backend/menus.control.php has an XSS via the id parameter.
GeniXCMS, in gxadmin/index.php has an XSS via the Menu ID field in a page=menus request.
Authenticated users can execute arbitrary PHP code via a .php file in a ZIP archive of a theme.
In the Upload Modules page, remote authenticated users can execute arbitrary PHP code via a .php file in a ZIP archive of a module.
GeniXCMS allows remote attackers to cause a denial of service (account blockage) by leveraging the mishandling of certain username substring relationships, such as the admin<script> username versus the admin username, related to register.php, User.class.php, and Type.class.php.
forgotpassword.php lacks a rate limit, which might allow remote attackers to cause a denial of service (login inability) or possibly conduct Arbitrary User Password Reset attacks via a series of requests.
GeniXCMS has an XSS that can be triggered by a comment that is mishandled during a publish-operation by an administrator.
GeniXCMS has an XSS that can be triggered by an authenticated user who submits a page.
GeniXCMS has an SQL Injection in inc/lib/Control/Backend/menus.control.php that can be exploited via the menuid parameter.
GeniXCMS contains an XSS that can be triggered by an authenticated comment that is mishandled during a mouse operation by an administrator.
GeniXCMS allows remote attackers to bypass the alertDanger MSG_USER_EMAIL_EXIST protection mechanism via a register.php?act=edit&id=1` request.
An SQL injection vulnerability exists in inc/lib/Control/Backend/posts.
SQL injection vulnerability in register.php in GeniXCMS allows remote attackers to execute arbitrary SQL commands via the activation parameter.