6.5
CVSSv3

CVE-2025-0001

CVSSv4: NA | CVSSv3: 6.5 | CVSSv2: NA | VMScore: 750 | EPSS: 0.00089 | KEV: Not Included
Published: 17/02/2025 Updated: 17/02/2025

Vulnerability Summary

Authenticated Arbitrary File Read Vulnerability in Abacus ERP Versions Before 2024.210.16036

Abacus ERP versions prior to 2024.210.16036, 2023.205.15833, and 2022.105.15542 have a security vulnerability. This vulnerability allows an authenticated user to read arbitrary files within the system. The issue impacts multiple version lines of the Abacus ERP software, creating potential risks for organizations using older versions of the application.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

abacus research ag abacus

Github Repositories

📑 CVE-Based Educational Labs To bridge the gap between theory and practice in cybersecurity education, we are developing an AI-powered system that dynamically generates cybersecurity best practices and hands-on labs based on real-world vulnerabilities This system leverages Retrieval-Augmented Generation (RAG) to enhance a Large Language Model (LLM) like Mistral or LLaMA, en

Vulnerability Parser: Backend and CLI for Managing Vulnerabilities Overview This repository contains 2 main components: Vulnerability Backend: A RESTful API built with FastAPI for creating, reading and deleting vulnerabilities Vulnerability CLI: A C# application that interacts with the backend API to facilitate tasks such as uploading bulk vulnerability data from JSON files

A Python-based API for grouping and detecting vulnerabilities with PostgreSQL.

READMEmd Vulnerability API Overview This project provides a Python-based RESTful API for managing and grouping vulnerabilities using Flask and PostgreSQL It is designed with modularity and best practices to ensure maintainability and scalability Features Group vulnerabilities by endpoint and CVE Seamless integration with PostgreSQL for data management Use of Flask-Migrat