creation_timestamp| type| source ---|---|--- 2025-06-12 13:08:41+00:00| seen|...Read More ...
Continue ReadingJune 12, 2025
creation_timestamp| type| source ---|---|--- 2025-06-12 13:03:41+00:00| seen|...Read More ...
Continue ReadingJune 12, 2025
creation_timestamp| type| source ---|---|--- 2025-06-12 12:53:41+00:00| seen|...Read More ...
Continue ReadingJune 12, 2025
creation_timestamp| type| source ---|---|--- 2025-06-12 13:13:41+00:00| seen|...Read More ...
Continue ReadingJune 12, 2025
All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and down ...
Continue ReadingJune 12, 2025
All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and down ...
Continue ReadingJune 12, 2025
Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files� ...
Continue ReadingJune 12, 2025
Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files� ...
Continue ReadingJune 12, 2025
Back to Main