8.8

CVSS4.0

CVE-2024-12284 - Authenticated privilege escalation

Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.

📅 Published: Feb. 19, 2025, 11:30 p.m. 🔄 Last Modified: Feb. 26, 2026, 7:08 p.m.

4.9

CVSS3.1

CVE-2024-6696 - Hitachi Vantara Pentaho Business Analytics Server - Insufficient Granularity of Access Control

The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, which renders the control policy too broad becau…

📅 Published: Feb. 19, 2025, 11:29 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

9.9

CVSS3.1

CVE-2024-37361 - Hitachi Vantara Pentaho Business Analytics Server - Deserialization of Untrusted Data

The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)   Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrusted JSON data without constraining the parse…

📅 Published: Feb. 19, 2025, 11:25 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

4.4

CVSS3.1

CVE-2024-37360 - Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Pag…

Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')   The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is serve…

📅 Published: Feb. 19, 2025, 11:01 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.6

CVSS3.1

CVE-2024-37359 - Hitachi Vantara Pentaho Business Analytics Server – Server Side Request Forgery

The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918)   Hitachi Vantara Pentaho Business Analytics Server versions before 10…

📅 Published: Feb. 19, 2025, 10:58 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2024-5705 - Hitachi Vantara Pentaho Business Analytics Server - Incorrect Authorization

The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. (CWE-863)     Hitachi Vantara Pentaho Business Analytics Server versions…

📅 Published: Feb. 19, 2025, 10:55 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.8

CVSS3.1

CVE-2024-5706 - Hitachi Vantara Pentaho Data Integration & Analytics - Improper Control of Resource Identifiers ('R…

The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99)  Hitachi Vantara Pentaho Data Integration & Analytics versions befo…

📅 Published: Feb. 19, 2025, 10:49 p.m. 🔄 Last Modified: April 15, 2026, 12:35 a.m.

8.2

CVSS3.1

CVE-2025-24989 - Microsoft Power Pages Elevation of Privilege Vulnerability

An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected customers have been notified. This update a…

📅 Published: Feb. 19, 2025, 10:18 p.m. 🔄 Last Modified: Feb. 13, 2026, 7:44 p.m.

8.6

CVSS3.1

CVE-2025-21355 - Microsoft Bing Remote Code Execution Vulnerability

Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network

📅 Published: Feb. 19, 2025, 10:18 p.m. 🔄 Last Modified: Feb. 13, 2026, 7:44 p.m.

8.7

CVSS4.0

CVE-2025-27092 - Path Traversal Vulnerability in GHOSTS Photo Retrieval Endpoint

GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended directory through the photo retrieval endpoint. T…

📅 Published: Feb. 19, 2025, 10:16 p.m. 🔄 Last Modified: Feb. 27, 2025, 8:18 p.m.
Total resulsts: 349182
Page 6682 of 34,919
« previous page » next page
Filters