{"uuid": "6ab69759-e104-405a-a89d-b248857b974b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0783", "type": "seen", "source": "https://t.me/cvedetector/16618", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0783 - Pankajindevops API Endpoint Remote Improper Access Control Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0783 \nPublished : Jan. 28, 2025, 7:15 p.m. | 19\u00a0minutes ago \nDescription : A vulnerability, which was classified as problematic, was found in pankajindevops scale up to 20241113. This affects an unknown part of the component API Endpoint. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. \nSeverity: 6.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"28 Jan 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-01-28T21:17:44.000000Z"}