Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SICK AG | SICK Field Analytics | all versions | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-49199 | 8.8 HIGH | Backup files can be modified and uploaded |
| CVE-2025-49181 | 8.6 HIGH | Configurations endpoint does not require authorization |
| CVE-2025-49182 | 7.5 HIGH | Credential disclosure |
| CVE-2025-49183 | 7.5 HIGH | Unencrypted communication (HTTP) |
| CVE-2025-49194 | 7.5 HIGH | Unencrypted communication |
| CVE-2025-49184 | 7.5 HIGH | Information disclosure to unauthorized user |
| CVE-2025-49197 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49200 | 6.5 MEDIUM | Unencrypted backup contains sensitive information |
| CVE-2025-49196 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49185 | 5.5 MEDIUM | Stored Cross-Site-Script |
| CVE-2025-49189 | 5.3 MEDIUM | Cookie missing HttpOnly flag |
| CVE-2025-49188 | 5.3 MEDIUM | Sensitive Data in URL |
| CVE-2025-49187 | 5.3 MEDIUM | User enumeration |
| CVE-2025-49186 | 5.3 MEDIUM | No brute-force protection |
| CVE-2025-49195 | 5.3 MEDIUM | No protection against brute-force attacks |
| CVE-2025-49192 | 4.3 MEDIUM | Clickjacking |
| CVE-2025-49190 | 4.3 MEDIUM | Server-Side Request Forgery |
| CVE-2025-49193 | 4.2 MEDIUM | Missing HTTP Security Headers |
| CVE-2025-49198 | 3.1 LOW | Poor quality of randomness in authorization tokens |
No comments yet