Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SICK AG | Field Analytics | all versions | - | |
| SICK AG | Baggage Analytics | all version | - | |
| SICK AG | Tire Analytics | all version | - | |
| SICK AG | Package Analytics | all versions | - | |
| SICK AG | Logistic Diagnostic Analytics | all versions | - | |
| SICK AG | Enterprise Analytics | all versions | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-49199 | 8.8 HIGH | Backup files can be modified and uploaded |
| CVE-2025-49181 | 8.6 HIGH | Configurations endpoint does not require authorization |
| CVE-2025-49182 | 7.5 HIGH | Credential disclosure |
| CVE-2025-49183 | 7.5 HIGH | Unencrypted communication (HTTP) |
| CVE-2025-49194 | 7.5 HIGH | Unencrypted communication |
| CVE-2025-49197 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49200 | 6.5 MEDIUM | Unencrypted backup contains sensitive information |
| CVE-2025-49196 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49185 | 5.5 MEDIUM | Stored Cross-Site-Script |
| CVE-2025-49189 | 5.3 MEDIUM | Cookie missing HttpOnly flag |
| CVE-2025-49188 | 5.3 MEDIUM | Sensitive Data in URL |
| CVE-2025-49187 | 5.3 MEDIUM | User enumeration |
| CVE-2025-49186 | 5.3 MEDIUM | No brute-force protection |
| CVE-2025-49195 | 5.3 MEDIUM | No protection against brute-force attacks |
| CVE-2025-49191 | 4.8 MEDIUM | Dashboards and iFrames can link malicious web content |
| CVE-2025-49192 | 4.3 MEDIUM | Clickjacking |
| CVE-2025-49190 | 4.3 MEDIUM | Server-Side Request Forgery |
| CVE-2025-49193 | 4.2 MEDIUM | Missing HTTP Security Headers |
| CVE-2025-49198 | 3.1 LOW | Poor quality of randomness in authorization tokens |
No comments yet