{"id":"CVE-2016-10096","details":"SQL injection vulnerability in register.php in GeniXCMS before 1.0.0 allows remote attackers to execute arbitrary SQL commands via the activation parameter.","aliases":["GHSA-gjcj-fj23-5j5v"],"modified":"2026-04-11T19:42:42.406854Z","published":"2017-01-01T19:59:00.133Z","references":[{"type":"WEB","url":"http://www.hackersb.cn/shenji/107.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/95172"},{"type":"REPORT","url":"https://github.com/semplon/GeniXCMS/issues/58"},{"type":"FIX","url":"https://github.com/semplon/GeniXCMS/commit/d885eb20006099262c0278932b9f8aca3c1ac97f"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/GeniXCMS/GeniXCMS","events":[{"introduced":"0"},{"last_affected":"c0809a1d7056e9703e0bbe506e0e9365bcc35cad"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"0.0.8"}],"cpe":"cpe:2.3:a:genixcms:genixcms:*:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.3-patch","v0.0.4","v0.0.4-patch","v0.0.5","v0.0.6","v0.0.7","v0.0.7-alpha","v0.0.7-alpha.1","v0.0.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10096.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/genixcms/genixcms","events":[{"introduced":"0"},{"fixed":"d885eb20006099262c0278932b9f8aca3c1ac97f"}],"database_specific":{"source":"REFERENCES"}}],"versions":["v0.0.1","v0.0.2","v0.0.3","v0.0.3-patch","v0.0.4","v0.0.4-patch","v0.0.5","v0.0.6","v0.0.7","v0.0.7-alpha","v0.0.7-alpha.1","v0.0.8"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-10096.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L"}]}