Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-1728 | In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://advisories.octopus.com/post/2024/sa2025-04/ |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 02 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server |
|
| CPEs | cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:* cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:* cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* |
|
| Vendors & Products |
Linux
Linux linux Kernel Microsoft Microsoft windows Octopus Octopus octopus Server |
|
| Metrics |
cvssV3_1
|
Tue, 11 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-79 | |
| Metrics |
ssvc
|
Tue, 11 Feb 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message. | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: Octopus
Published:
Updated: 2025-02-11T14:41:18.275Z
Reserved: 2025-01-16T06:52:12.103Z
Link: CVE-2025-0513
Updated: 2025-02-11T14:41:12.414Z
Status : Analyzed
Published: 2025-02-11T11:15:15.817
Modified: 2025-07-02T17:24:18.387
Link: CVE-2025-0513
No data.
OpenCVE Enrichment
No data.
EUVD