6.8
CVE-2025-24907 - Hitachi Vantara Pentaho Data Integration & Analytics – Path Traversal
Overview The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) Descriptio…
4.9
CVE-2025-24911 - Hitachi Vantara Pentaho Business Analytics Server - Improper Restriction of XML External Entity Ref…
Overview XML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back i…
4.9
CVE-2025-24910 - Hitachi Vantara Pentaho Business Analytics Server - Improper Restriction of XML External Entity Ref…
Overview XML documents optionally contain a Document Type Definition (DTD), which, among other features, enables the definition of XML entities. It is possible to define an entity by providing a substitution string in the form of a URI. Once the content of the URI is read, it is fed back i…
4.4
CVE-2025-24909 - Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Pag…
Overview The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) Description Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.…
6.8
CVE-2025-24908 - Hitachi Vantara Pentaho Data Integration & Analytics – Path Traversal
Overview The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize '.../...//' (doubled triple dot slash) sequences that can resolve to a location that is outside of that directory. (CWE-35) Descriptio…
9.1
CVE-2025-0756 - Hitachi Vantara Pentaho Data Integration & Analytics - Improper Control of Resource Identifiers ('R…
Overview The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) Description Hitachi Vantara Pentaho D…
4.4
CVE-2025-0757 - Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Pag…
Overview The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) Description Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.2…
6.1
CVE-2025-0758 - Hitachi Vantara Pentaho Business Analytics Server - Incorrect Permission Assignment for Critical Re…
Overview The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732) Description Hitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is i…
4.3
CVE-2025-32791 - Permission policy information leakage in Backstage permission system
The Backstage Scaffolder plugin houses types and utilities for building scaffolder-related modules. A vulnerability in the Backstage permission plugin backend allows callers to extract some information about the conditional decisions returned by the permission policy installed in the permission bac…
3.1
CVE-2025-32789 - EspoCRM Allows Potential Disclosure of Sensitive Information in the User Sorting Function
EspoCRM is an Open Source Customer Relationship Management software. Prior to version 9.0.7, users can be sorted by their password hash. This flaw allows an attacker to make assumptions about the hash values of other users stored in the password column of the user table, based on the results of the…