{"uuid": "430e584e-38db-4c6c-aa40-3c4f35871b50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0659", "type": "seen", "source": "https://t.me/cvedetector/16614", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0659 - Rockwell Automation DataEdge Platform DataMosaix Private Cloud Path Traversal Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0659 \nPublished : Jan. 28, 2025, 4:15 p.m. | 1\u00a0hour, 18\u00a0minutes ago \nDescription : A path  \ntraversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character  \nsequence in the body of the vulnerable endpoint, it is possible to overwrite  \nfiles outside of the intended directory. A threat actor with admin privileges could  \nleverage this vulnerability to overwrite reports including user projects. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T18:47:25.000000Z"}