4.6
CVE-2026-1628 - Mattermost allows external websites to open within the app, exposing preload functionality to non-tโฆ
Mattermost Desktop App versions <=5.13.3 fail to attach listeners restricting navigation to external sites within the Mattermost app which allows a malicious server to expose preload script functionality to untrusted servers via having a user open an external link in their Mattermost server. Matterโฆ
9.3
CVE-2026-3432 - Sim Studio AI - Unauthenticated OAuth Token Theft
On SimStudio version below to 0.5.74, the `/api/auth/oauth/token` endpoint contains a code path that bypasses all authorization checks when provided with `credentialAccountUserId` and `providerId` parameters. An unauthenticated attacker can retrieve OAuth access tokens for any user by supplying theโฆ
9.8
CVE-2026-3431 - Sim Studio AI - MongoDB SSRF and Arbitrary Document Deletion
On SimStudio version below to 0.5.74, the MongoDB tool endpoints accept arbitrary connection parameters from the caller without authentication or host restrictions. An attacker can leverage these endpoints to connect to any reachable MongoDB instance and perform unauthorized operations including reโฆ
9.3
CVE-2025-14532 - Remote Code Execution via Unrestricted File Upload in DobryCMS
DobryCMS's upload file functionality allows an unauthenticated remote attacker to upload files of any type and extension without restriction, which can result in Remote Code Execution. This issue was fixed in versions above 5.0.
9.3
CVE-2025-12462 - Blind SQL Injection in DobryCMS
A Blind SQL injection vulnerability has been identified in DobryCMS. A remote unauthenticated attacker is able to inject SQL syntax into URL path resulting in Blind SQL Injection. This issue was fixed in versions above 8.0.
5.3
CVE-2025-58406 - Lack of HTTP Response Headers
The CGM CLININET application respond without essential security HTTP headers, exposing users to clientโside attacks such as clickjacking, MIME sniffing, unsafe caching, weak crossโorigin isolation, and missing transport security controls.
5.3
CVE-2025-58405 - Lack of protection mechanisms against Clickjacking attacks
The CGM CLININET application does not implement any mechanisms that prevent clickjacking attacks, neither HTTP security headers nor HTML-based frameโbusting protections were detected. As a result, an attacker can embed the application inside a maliciously crafted IFRAME and trick users into performโฆ
7.1
CVE-2025-58402 - Insecure Direct Object Reference Message ID
The CGM CLININET application uses direct, sequential object identifiers "MessageID" without proper authorization checks. By modifying the parameter in the GET request, an attacker can access messages and attachments belonging to other users.
6.9
CVE-2025-30062 - SQL injection in CheckUnitCodeAndKey.pl
In the "CheckUnitCodeAndKey.pl" service, the "validateOrgUnit" function is vulnerable to SQL injection.
9.4
CVE-2025-30044 - RCE on uhcapache user permissions
In the endpoints "/cgi-bin/CliniNET.prd/utils/usrlogstat_simple.pl", "/cgi-bin/CliniNET.prd/utils/usrlogstat.pl", "/cgi-bin/CliniNET.prd/utils/userlogstat2.pl", and "/cgi-bin/CliniNET.prd/utils/dblogstat.pl", the parameters are not sufficiently normalized, which enables code injection.