A vulnerability in the Redfish API of Cisco UCS B-Series, Cisco UCS Managed C-Series, and Cisco UCS X-Series Servers could allow an authenticated, remote attacker with administrative privileges to per ...
Continue ReadingMay 23, 2025
creation_timestamp| type| source ---|---|--- 2025-05-23 15:13:09+00:00| seen|...Read More ...
Continue ReadingMay 23, 2025
An incorrect permission check in Jenkins GitLab Plugin 1.9.6 and earlier allows attackers with global Item/Configure permission (while lacking Item/Configure permission on any particular job) to enume ...
Continue ReadingMay 23, 2025
creation_timestamp| type| source ---|---|--- 2025-05-23 11:27:23+00:00| seen|...Read More ...
Continue ReadingMay 23, 2025
A vulnerability in a specific REST API endpoint of Cisco NDFC could allow an authenticated, low-privileged, remote attacker to learn sensitive information on an affected device. This vulnerability is ...
Continue ReadingMay 23, 2025
This vulnerability exists in Apex Softcell LD DP Back Office due to improper implementation of OTP validation mechanism in certain API endpoints. An authenticated remote attacker could exploit this vu ...
Continue ReadingMay 23, 2025
Khoj is an application that creates personal AI agents. The Automation feature allows a user to insert arbitrary HTML inside the task instructions, resulting in a Stored XSS. The q parameter for the / ...
Continue ReadingMay 23, 2025
An improper access control (IDOR) vulnerability in the /api-selfportal/get-info-token-properties endpoint in MFASOFT Secure Authentication Server (SAS) 1.8.x through 1.9.x before 1.9.040924 allows rem ...
Continue ReadingMay 23, 2025
Back to Main