[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"all-banners":3,"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0":4,"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU":11,"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU":17,"vulnerability-28965":24},[],["Island",5],{"key":6,"params":7,"result":9},"SkipToContent_34xgpJIRRkpiT6ls6jE4NHf7VpvQCQBEwi69exi4oT0",{"props":8},"{}",{"head":10},{},["Island",12],{"key":13,"params":14,"result":15},"FooterNav_JsYsxvLufb1W12aeknKZ89on0MD0bNDTiB5EYxyxmU",{"props":8},{"head":16},{},["Island",18],{"key":19,"params":20,"result":22},"FooterSocial_u16tCafBUeGMoDrdLfTINytP2JB5msc6iB3VDUutAoU",{"props":21},"{\"text-color\":\"gray\"}",{"head":23},{},{"id":25,"detectable_with":26,"vuln_details":33,"vuln_id":41,"name":42,"published":43,"updated":34},28965,{"tool":27,"engine":30},{"id":28,"name":29},1,"Network Scanner",{"id":31,"name":32},2,"Nuclei",{"id":25,"codename":34,"description":34,"severity":35,"risk_description":36,"public_description":34,"public_recommendation":37,"recommendation":34,"references":38,"cvssv3":34,"epss_score":34,"epss_percentile":34,"cve":34,"in_cisa_catalog":40,"date":34,"software_type":34,"vendor":34,"product":34,"ptt_exploit_capabilities":34},null,"medium","The risk exists that an attacker can use the vulnerability identified to perform further attacks on the server.","We recommend reviewing the purpose of the application or the server and applying patches, if applicable.",[39],"https://github.com/renniepak/CSPBypass/blob/main/data.tsv",false,"NETSCAN-NUCLEI-VULNERABILITIES-QUANTSERVE-SEGAPI-CSP-BYPASS","Content-Security-Policy Bypass - Quantserve SegAPI","2026-02-26T00:00:00Z"]