Metrics
Affected Vendors & Products
Link | Providers |
---|---|
https://advisories.octopus.com/post/2024/sa2025-02/ |
![]() ![]() |
Wed, 02 Jul 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Linux
Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server |
|
CPEs | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
Vendors & Products |
Linux
Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server |
|
Metrics |
cvssV3_1
|
Mon, 24 Mar 2025 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Tue, 11 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_1
|
Tue, 11 Feb 2025 10:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server. | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Octopus
Published: 2025-02-11T09:53:25.849Z
Updated: 2025-03-24T16:29:52.963Z
Reserved: 2025-01-17T02:42:42.838Z
Link: CVE-2025-0525

Updated: 2025-02-11T14:32:26.253Z

Status : Analyzed
Published: 2025-02-11T10:15:09.490
Modified: 2025-07-02T17:24:44.863
Link: CVE-2025-0525

No data.