Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.9

    MEDIUM
    CVE-2024-6696

    The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, whic... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 20, 2025
    • Modified: Feb. 20, 2025
    • Vuln Type: Authorization
  • 6.5

    MEDIUM
    CVE-2024-37363

    The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862)  Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, do not correctl... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 20, 2025
    • Modified: Feb. 20, 2025
    • Vuln Type: Authorization
  • 6.3

    MEDIUM
    CVE-2024-37362

    The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522)   Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 ... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 20, 2025
    • Modified: Feb. 20, 2025
    • Vuln Type: Cryptography
  • 9.9

    CRITICAL
    CVE-2024-37361

    The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502)   Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrus... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 20, 2025
    • Modified: Feb. 20, 2025
    • Vuln Type: Injection
  • 8.8

    HIGH
    CVE-2024-12284

    Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.... Read more

    Affected Products : netscaler_console netscaler_agent
    • Published: Feb. 20, 2025
    • Modified: Jul. 25, 2025
    • Vuln Type: Authorization
  • 8.7

    HIGH
    CVE-2025-27092

    GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended direc... Read more

    Affected Products : ghosts
    • Published: Feb. 19, 2025
    • Modified: Feb. 27, 2025
    • Vuln Type: Path Traversal
  • 5.5

    MEDIUM
    CVE-2025-25947

    An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file.... Read more

    Affected Products : bento4
    • Published: Feb. 19, 2025
    • Modified: May. 13, 2025
    • Vuln Type: Memory Corruption
  • 5.5

    MEDIUM
    CVE-2025-25946

    An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially c... Read more

    Affected Products : bento4
    • Published: Feb. 19, 2025
    • Modified: Jun. 09, 2025
    • Vuln Type: Memory Corruption
  • 6.5

    MEDIUM
    CVE-2025-25945

    An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the Mp4Fragment.cpp and in AP4_DescriptorFactory::CreateDescriptorFromStream at Ap4DescriptorFactory.cpp.... Read more

    Affected Products : bento4
    • Published: Feb. 19, 2025
    • Modified: May. 13, 2025
    • Vuln Type: Information Disclosure
  • 7.3

    HIGH
    CVE-2025-25944

    Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file.... Read more

    Affected Products : bento4
    • Published: Feb. 19, 2025
    • Modified: May. 13, 2025
    • Vuln Type: Memory Corruption
  • 7.8

    HIGH
    CVE-2025-25943

    Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the AP4_Stz2Atom::AP4_Stz2Atom component located in Ap4Stz2Atom.cpp.... Read more

    Affected Products : bento4
    • Published: Feb. 19, 2025
    • Modified: May. 13, 2025
    • Vuln Type: Memory Corruption
  • 6.5

    MEDIUM
    CVE-2025-25942

    An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the mp4fragment tool when processing invalid files. Specifically, memory allocated in SampleArray::SampleArray in Mp4Fragment.cpp is not properly released.... Read more

    Affected Products : bento4
    • Published: Feb. 19, 2025
    • Modified: May. 13, 2025
    • Vuln Type: Information Disclosure
  • 9.8

    CRITICAL
    CVE-2025-24989

    An improper access control vulnerability in Power Pages allows an unauthorized attacker to elevate privileges over a network potentially bypassing the user registration control. This vulnerability has already been mitigated in the service and all affected... Read more

    Affected Products : power_pages
    • Actively Exploited
    • Published: Feb. 19, 2025
    • Modified: Feb. 24, 2025
    • Vuln Type: Authorization
  • 9.8

    CRITICAL
    CVE-2025-21355

    Missing Authentication for Critical Function in Microsoft Bing allows an unauthorized attacker to execute code over a network... Read more

    Affected Products : bing
    • Published: Feb. 19, 2025
    • Modified: Feb. 19, 2025
    • Vuln Type: Authentication
  • 8.8

    HIGH
    CVE-2024-5706

    The product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99)  Hitachi Vantara Pentah... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 19, 2025
    • Modified: Feb. 19, 2025
    • Vuln Type: Misconfiguration
  • 8.8

    HIGH
    CVE-2024-5705

    The product performs an authorization check when an actor attempts to access a resource or perform an action, but it does not correctly perform the check. This allows attackers to bypass intended access restrictions. (CWE-863)     Hitachi Vantar... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 19, 2025
    • Modified: Feb. 19, 2025
    • Vuln Type: Authorization
  • 4.4

    MEDIUM
    CVE-2024-37360

    Hitachi Vantara Pentaho Business Analytics Server - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')   The software does not neutralize or incorrectly neutralize user-controllable input before it is placed in out... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 19, 2025
    • Modified: Feb. 19, 2025
    • Vuln Type: Cross-Site Scripting
  • 8.6

    HIGH
    CVE-2024-37359

    The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination. (CWE-918)   Hitachi Vantara Pentaho ... Read more

    Affected Products : pentaho_business_analytics_server
    • Published: Feb. 19, 2025
    • Modified: Feb. 19, 2025
    • Vuln Type: Server-Side Request Forgery
  • 5.4

    MEDIUM
    CVE-2023-51305

    PHPJabbers Car Park Booking System v3.0 is vulnerable to Multiple Stored Cross-Site Scripting (XSS) in the "name, plugin_sms_api_key, plugin_sms_country_code, title, plugin_sms_api_key" parameters.... Read more

    Affected Products :
    • Published: Feb. 19, 2025
    • Modified: Feb. 20, 2025
    • Vuln Type: Cross-Site Scripting
  • 6.9

    MEDIUM
    CVE-2025-27090

    Sliver is an open source cross-platform adversary emulation/red team framework, it can be used by organizations of all sizes to perform security testing. The reverse port forwarding in sliver teamserver allows the implant to open a reverse tunnel on the s... Read more

    Affected Products : sliver
    • Published: Feb. 19, 2025
    • Modified: Feb. 27, 2025
Showing 20 of 291782 Results