8.8
CVE-2024-12284 - Authenticated privilege escalation
Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.
4.9
CVE-2024-6696 - Hitachi Vantara Pentaho Business Analytics Server - Insufficient Granularity of Access Control
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad becau…
9.9
CVE-2024-37361 - Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502) Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parse…
4.4
CVE-2024-37360 - Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Pag…
Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is serve…
8.6
CVE-2024-37359 - Hitachi Vantara Pentaho Business Analytics Server – Server Side Request Forgery
The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918) Hitachi Vantara Pentaho Business Analytics Server versions before 10…
8.8
CVE-2024-5705 - Hitachi Vantara Pentaho Business Analytics Server - Incorrect Authorization
The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. (CWE-863) Hitachi Vantara Pentaho Business Analytics Server versions…
8.8
CVE-2024-5706 - Hitachi Vantara Pentaho Data Integration & Analytics - Improper Control of Resource Identifiers ('R…
The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) Hitachi Vantara Pentaho Data Integration & Analytics versions befo…
8.2
CVE-2025-24989 - Microsoft Power Pages Elevation of Privilege Vulnerability
An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update a…
8.6
CVE-2025-21355 - Microsoft Bing Remote Code Execution Vulnerability
Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network
8.7
CVE-2025-27092 - Path Traversal Vulnerability in GHOSTS Photo Retrieval Endpoint
GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. T…