{"uuid": "54d6ab20-ec7b-4389-8b84-9f09b9a1b491", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2528", "type": "seen", "source": "https://t.me/cvedetector/21204", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-2528 - Devolutions Remote Desktop Manager Authentication Bypass\", \n  \"Content\": \"CVE ID : CVE-2025-2528 \nPublished : March 26, 2025, 6:15 p.m. | 31\u00a0minutes ago \nDescription : Improper authorization in application password policy in Devolutions Remote Desktop Manager on Windows allows an authenticated user to   \nuse a configuration different from the one mandated by the system administrators.  \n  \n  \n  \n  \n  \nThis issue affects Remote Desktop Manager versions from 2025.1.24 through 2025.1.25, and all versions up to 2024.3.29. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"26 Mar 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-03-26T20:34:49.000000Z"}