[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"repo-stars":3,"vuln-CVE-2026-44666":6},{"stargazers_count":4,"fetched_at":5},5,"2026-05-15T08:03:46.741Z",{"id":7,"descriptions":8,"cisa":9,"weaknesses":10,"exploits":40,"aliases":41,"duplicate_of":9,"upstream":42,"downstream":43,"duplicates":44,"related":45,"reserved_at":9,"published_at":46,"modified_at":46,"state":47,"summary":48,"references_raw":55,"kevs":67,"epss":9,"epss_history":68,"metrics":69,"affected":76},"CVE-2026-44666","HRConvert2 is a self-hosted, drag-and-drop & nosql file conversion server & share tool. Prior to 3.3.8, the sanitizeString() function in convertCore.php is missing backtick (`) and tab (\\t) from its strip list. User input then reaches shell_exec(), where the shell interprets these characters and commands within filenames execute. This vulnerability is fixed in 3.3.8.",null,[11],{"_key":12,"id":12,"name":13,"description":14,"type":15,"status":16,"abstraction":17,"likelihood_of_exploit":18,"capec":19},"CWE-78","Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.","weakness","Stable","Base","High",[20,24,28,32,36],{"id":21,"name":22,"techniques":23},"CAPEC-108","Command Line Execution through SQL Injection",[],{"id":25,"name":26,"techniques":27},"CAPEC-15","Command Delimiters",[],{"id":29,"name":30,"techniques":31},"CAPEC-43","Exploiting Multiple Input Interpretation Layers",[],{"id":33,"name":34,"techniques":35},"CAPEC-6","Argument Injection",[],{"id":37,"name":38,"techniques":39},"CAPEC-88","OS Command Injection",[],[],[],[],[],[],[],"2026-05-14T20:32:43.490Z","Received",{"cisa_kev":49,"cisa_ransomware":49,"cisa_vendor":9,"epss_severity":9,"epss_score":9,"severity":50,"severity_score":51,"severity_version":52,"severity_source":53,"severity_vector":54,"severity_status":47},false,"critical",9.3,"v4.0","cve.org","CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",[56,62],{"url":57,"sources":58,"tags":60},"https://github.com/zelon88/HRConvert2/security/advisories/GHSA-f74g-4wj8-j35h",[53,59],"nvd",[61],"X Refsource CONFIRM",{"url":63,"sources":64,"tags":65},"https://github.com/zelon88/HRConvert2/releases/tag/v3.3.8",[53,59],[66],"X Refsource MISC",[],[],[70,73],{"source":53,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":71},{"baseScore":51,"baseSeverity":72,"vectorString":54,"impactScore":9,"exploitabilityScore":9},"CRITICAL",{"source":59,"cvss_v2_0":9,"cvss_v3_0":9,"cvss_v3_1":9,"cvss_v4_0":74},{"baseScore":51,"baseSeverity":72,"vectorString":75,"impactScore":9,"exploitabilityScore":9},"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",[77],{"ecosystem":9,"name":78,"vendor":79,"product":80,"cpe_part":81,"purl_type":9,"purl_namespace":9,"purl_name":9,"source":9,"versions":82},"HRConvert2","zelon88","hrconvert2","a",[83],{"version":84,"is_range":85,"range_type":53,"version_start":9,"version_start_type":9,"version_end":86,"version_end_type":87,"fixed_in":9},"\u003C 3.3.8",true,"3.3.8","excluding"]