Latest CVE Feed
-
4.3
MEDIUMCVE-2024-43196
IBM OpenPages with Watson 8.3 and 9.0 application could allow an authenticated user to manipulate data in the Questionnaires application allowing the user to spoof other users' responses.... Read more
- Published: Feb. 20, 2025
- Modified: Mar. 11, 2025
- Vuln Type: Authorization
-
5.3
MEDIUMCVE-2025-24947
A hash collision vulnerability (in the hash table used to manage connections) in LSQUIC (aka LiteSpeed QUIC) before 4.2.0 allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding S... Read more
Affected Products : lsquic- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Denial of Service
-
5.3
MEDIUMCVE-2025-24946
The hash table used to manage connections in picoquic before b80fd3f uses a weak hash function, allowing remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with colliding Source Connection IDs (SC... Read more
Affected Products : picoquic- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Denial of Service
-
5.3
MEDIUMCVE-2025-23020
An issue was discovered in Kwik before 0.10.1. A hash collision vulnerability (in the hash table used to manage connections) allows remote attackers to cause a considerable CPU load on the server (a Hash DoS attack) by initiating connections with collidin... Read more
Affected Products :- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Denial of Service
-
7.8
HIGHCVE-2025-1492
Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file... Read more
Affected Products : wireshark- Published: Feb. 20, 2025
- Modified: Apr. 10, 2025
- Vuln Type: Denial of Service
-
8.2
HIGHCVE-2025-1293
Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0.... Read more
Affected Products :- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Authentication
-
6.1
MEDIUMCVE-2025-1223
An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac... Read more
- Published: Feb. 20, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Authorization
-
6.1
MEDIUMCVE-2025-1222
An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac... Read more
- Published: Feb. 20, 2025
- Modified: Aug. 06, 2025
- Vuln Type: Authorization
-
6.8
MEDIUMCVE-2025-0112
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XD... Read more
Affected Products : cortex_xdr_agent- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-6697
The product does not handle or incorrectly handles when it has insufficient privileges to access resources or functionality as specified by their permissions. This may cause it to follow unexpected code paths that may leave the product in an invalid state... Read more
Affected Products : pentaho_business_analytics_server- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Authorization
-
4.9
MEDIUMCVE-2024-6696
The product implements access controls via a policy or other feature with the intention to disable or restrict accesses (reads and/or writes) to assets in a system from untrusted agents. However, implemented access controls lack required granularity, whic... Read more
Affected Products : pentaho_business_analytics_server- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Authorization
-
6.5
MEDIUMCVE-2024-37363
The product does not perform an authorization check when an actor attempts to access a resource or perform an action. (CWE-862) Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.8, including 8.3.x, do not correctl... Read more
Affected Products : pentaho_business_analytics_server- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Authorization
-
6.3
MEDIUMCVE-2024-37362
The product transmits or stores authentication credentials, but it uses an insecure method that is susceptible to unauthorized interception and/or retrieval. (CWE-522) Hitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.0 ... Read more
Affected Products : pentaho_business_analytics_server- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Cryptography
-
9.9
CRITICALCVE-2024-37361
The application deserializes untrusted data without sufficiently verifying that the resulting data will be valid. (CWE-502) Hitachi Vantara Pentaho Business Analytics Server versions before 10.2.0.0 and 9.3.0.9, including 8.3.x, deserialize untrus... Read more
Affected Products : pentaho_business_analytics_server- Published: Feb. 20, 2025
- Modified: Feb. 20, 2025
- Vuln Type: Injection
-
8.8
HIGHCVE-2024-12284
Authenticated privilege escalation in NetScaler Console and NetScaler Agent allows.... Read more
- Published: Feb. 20, 2025
- Modified: Jul. 25, 2025
- Vuln Type: Authorization
-
8.7
HIGHCVE-2025-27092
GHOSTS is an open source user simulation framework for cyber experimentation, simulation, training, and exercise. A path traversal vulnerability was discovered in GHOSTS version 8.0.0.0 that allows an attacker to access files outside of the intended direc... Read more
Affected Products : ghosts- Published: Feb. 19, 2025
- Modified: Feb. 27, 2025
- Vuln Type: Path Traversal
-
5.5
MEDIUMCVE-2025-25947
An issue in Bento4 v1.6.0-641 allows an attacker to trigger a segmentation fault via Ap4Atom.cpp, specifically in AP4_AtomParent::RemoveChild, during the execution of mp4encrypt with a specially crafted MP4 input file.... Read more
Affected Products : bento4- Published: Feb. 19, 2025
- Modified: May. 13, 2025
- Vuln Type: Memory Corruption
-
5.5
MEDIUMCVE-2025-25946
An issue in Bento4 v1.6.0-641 allows an attacker to cause a memory leak via Ap4Marlin.cpp and Ap4Processor.cpp, specifically in AP4_MarlinIpmpEncryptingProcessor::Initialize and AP4_Processor::Process, during the execution of mp4encrypt with a specially c... Read more
Affected Products : bento4- Published: Feb. 19, 2025
- Modified: Jun. 09, 2025
- Vuln Type: Memory Corruption
-
6.5
MEDIUMCVE-2025-25945
An issue in Bento4 v1.6.0-641 allows an attacker to obtain sensitive information via the the Mp4Fragment.cpp and in AP4_DescriptorFactory::CreateDescriptorFromStream at Ap4DescriptorFactory.cpp.... Read more
Affected Products : bento4- Published: Feb. 19, 2025
- Modified: May. 13, 2025
- Vuln Type: Information Disclosure
-
7.3
HIGHCVE-2025-25944
Buffer Overflow vulnerability in Bento4 v.1.6.0-641 allows a local attacker to execute arbitrary code via the Ap4RtpAtom.cpp, specifically in AP4_RtpAtom::AP4_RtpAtom, during the execution of mp4fragment with a crafted MP4 input file.... Read more
Affected Products : bento4- Published: Feb. 19, 2025
- Modified: May. 13, 2025
- Vuln Type: Memory Corruption