Metrics
Affected Vendors & Products
Tue, 02 Sep 2025 18:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Atlassian
Atlassian agiloft |
|
CPEs | cpe:2.3:a:atlassian:agiloft:*:*:*:*:*:*:*:* | |
Vendors & Products |
Atlassian
Atlassian agiloft |
Fri, 29 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 27 Aug 2025 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Agiloft
Agiloft agiloft |
|
Vendors & Products |
Agiloft
Agiloft agiloft |
Tue, 26 Aug 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Agiloft Release 28 contains several accounts with default credentials that could allow local privilege escalation. The password hash is known for at least one of the accounts and the credentials could be cracked offline. Users should upgrade to Agiloft Release 30. | |
Title | Agiloft local privilege escalation via default credentials | |
Weaknesses | CWE-1392 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: cisa-cg
Published:
Updated: 2025-08-29T18:29:07.509Z
Reserved: 2025-04-15T20:56:24.416Z
Link: CVE-2025-35114

Updated: 2025-08-29T18:29:03.053Z

Status : Analyzed
Published: 2025-08-26T23:15:35.377
Modified: 2025-09-02T17:58:00.227
Link: CVE-2025-35114

No data.

Updated: 2025-08-27T11:41:35Z