Metrics
Affected Vendors & Products
| Link | Providers | 
|---|---|
| https://advisories.octopus.com/post/2024/sa2025-02/ | 
                     | 
            
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        
        epss
         
  | 
    
        
        
        epss
         
  | 
Wed, 02 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Linux
         Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server  | 
|
| CPEs | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*  | 
|
| Vendors & Products | 
        
        Linux
         Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server  | 
|
| Metrics | 
        
        cvssV3_1
         
  | 
Mon, 24 Mar 2025 17:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        cvssV3_1
         
  | 
    
Tue, 11 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-200 | |
| Metrics | 
        
        cvssV3_1
         
 
  | 
Tue, 11 Feb 2025 10:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server. | |
| References | 
         | |
| Metrics | 
        
        cvssV4_0
         
  | 
Status: PUBLISHED
Assigner: Octopus
Published: 2025-02-11T09:53:25.849Z
Updated: 2025-03-24T16:29:52.963Z
Reserved: 2025-01-17T02:42:42.838Z
Link: CVE-2025-0525
Updated: 2025-02-11T14:32:26.253Z
Status : Analyzed
Published: 2025-02-11T10:15:09.490
Modified: 2025-07-02T17:24:44.863
Link: CVE-2025-0525
No data.
ReportizFlow