cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2018-10854,https://securityvulnerability.io/vulnerability/CVE-2018-10854,Cross-Site Scripting Vulnerability in CloudForms by Red Hat,"A vulnerability has been identified in CloudForms, affecting versions 5.8 and 5.9. This flaw is linked to the v2v infrastructure mapping delete feature, where improper sanitization of user input in the Name field allows for stored cross-site scripting attacks. An attacker could exploit this vulnerability to execute arbitrary scripts in the context of a user's session, potentially compromising their data and actions.",Red Hat,Cloudforms,6.5,MEDIUM,0.0005000000237487257,false,,false,false,false,,,false,false,,2019-11-22T11:51:08.000Z,0 CVE-2019-10177,https://securityvulnerability.io/vulnerability/CVE-2019-10177,Stored Cross-Site Scripting Vulnerability in CloudForms by Red Hat,"A stored cross-site scripting vulnerability exists within the PDF export component of CloudForms versions 5.9 and 5.10. This flaw arises because user input is not adequately sanitized, allowing attackers with minimal privileges to edit compute resources to launch XSS attacks against other users. Such exploitation may lead to the execution of malicious code and the unauthorized extraction of anti-CSRF tokens, potentially compromising the security of higher-privileged users.",Red Hat,Cloudforms,6.5,MEDIUM,0.0010000000474974513,false,,false,false,false,,,false,false,,2019-06-27T20:50:45.000Z,0 CVE-2017-15123,https://securityvulnerability.io/vulnerability/CVE-2017-15123,Improper Access Control in CloudForms Web Interface by Red Hat,"A security flaw in the CloudForms web interface (versions 5.8 - 5.10) allows unauthorized users to access RSS feed URLs without proper authentication. This vulnerability could result in the exposure of sensitive information, including details about newly created virtual machines. Proper security measures should be implemented to prevent unauthorized access and protect sensitive data.",Red Hat,Cloudforms,5.3,MEDIUM,0.00139999995008111,false,,false,false,false,,,false,false,,2019-06-12T13:39:34.000Z,0 CVE-2017-2653,https://securityvulnerability.io/vulnerability/CVE-2017-2653,,A number of unused delete routes are present in CloudForms before 5.7.2.1 which can be accessed via GET requests instead of just POST requests. This could allow an attacker to bypass the protect_from_forgery XSRF protection causing the routes to be used. This attack would require additional cross-site scripting or similar attacks in order to execute.,Red Hat,Cloudforms,4.1,MEDIUM,0.0008900000248104334,false,,false,false,false,,,false,false,,2018-07-27T18:00:00.000Z,0 CVE-2017-15125,https://securityvulnerability.io/vulnerability/CVE-2017-15125,,A flaw was found in CloudForms before 5.9.0.22 in the self-service UI snapshot feature where the name field is not properly sanitized for HTML and JavaScript input. An attacker could use this flaw to execute a stored XSS attack on an application administrator using CloudForms. Please note that CSP (Content Security Policy) prevents exploitation of this XSS however not all browsers support CSP.,Red Hat,Cloudforms,6.5,MEDIUM,0.0007699999841861427,false,,false,false,false,,,false,false,,2018-07-27T15:00:00.000Z,0 CVE-2017-2664,https://securityvulnerability.io/vulnerability/CVE-2017-2664,,CloudForms Management Engine (cfme) before 5.7.3 and 5.8.x before 5.8.1 lacks RBAC controls on certain methods in the rails application portion of CloudForms. An attacker with access could use a variety of methods within the rails application portion of CloudForms to escalate privileges.,Red Hat,Cloudforms,6.5,MEDIUM,0.0017099999822676182,false,,false,false,false,,,false,false,,2018-07-26T14:00:00.000Z,0 CVE-2017-12191,https://securityvulnerability.io/vulnerability/CVE-2017-12191,,"A flaw was found in the CloudForms account configuration when using VMware. By default, a shared account is used that has privileged access to VMRC (VMWare Remote Console) functions that may not be appropriate for users of CloudForms (and thus this account). An attacker could use this vulnerability to view and make changes to settings in the VMRC and virtual machines controlled by it that they should not have access to.",Red Hat,Cloudforms,7.4,HIGH,0.0007099999929778278,false,,false,false,false,,,false,false,,2018-02-28T13:00:00.000Z,0