{"uuid": "40f55dd0-8a6c-4461-87b6-6bfd72d5d5b5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0526", "type": "seen", "source": "https://t.me/cvedetector/17699", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0526 - Octopus Deploy File Upload Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0526 \nPublished : Feb. 11, 2025, 11:15 a.m. | 52\u00a0minutes ago \nDescription : In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-11T13:10:29.000000Z"}