{"uuid": "4e7a4fe4-30a7-4717-a46e-16cecf76d4d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-27150", "type": "seen", "source": "https://t.me/cvedetector/19532", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-27150 - Tuleap Redis Password Disclosure\", \n  \"Content\": \"CVE ID : CVE-2025-27150 \nPublished : March 4, 2025, 5:15 p.m. | 1\u00a0hour, 32\u00a0minutes ago \nDescription : Tuleap is an Open Source Suite to improve management of software developments and collaboration. The password to connect the Redis instance is not purged from the archive generated with tuleap collect-system-data. These archives are likely to be used by support teams that should not have access to this password. The vulnerability is fixed in Tuleap Community Edition 16.4.99.1740492866 and Tuleap Enterprise Edition 16.4-6 and 16.3-11. \nSeverity: 5.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"04 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-04T20:01:49.000000Z"}