Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SICK AG | SICK Media Server | 0 ~ 1.5 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-49199 | 8.8 HIGH | Backup files can be modified and uploaded |
| CVE-2025-49181 | 8.6 HIGH | Configurations endpoint does not require authorization |
| CVE-2025-49182 | 7.5 HIGH | Credential disclosure |
| CVE-2025-49194 | 7.5 HIGH | Unencrypted communication |
| CVE-2025-49183 | 7.5 HIGH | Unencrypted communication (HTTP) |
| CVE-2025-49184 | 7.5 HIGH | Information disclosure to unauthorized user |
| CVE-2025-49196 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49200 | 6.5 MEDIUM | Unencrypted backup contains sensitive information |
| CVE-2025-49185 | 5.5 MEDIUM | Stored Cross-Site-Script |
| CVE-2025-49189 | 5.3 MEDIUM | Cookie missing HttpOnly flag |
| CVE-2025-49188 | 5.3 MEDIUM | Sensitive Data in URL |
| CVE-2025-49187 | 5.3 MEDIUM | User enumeration |
| CVE-2025-49186 | 5.3 MEDIUM | No brute-force protection |
| CVE-2025-49195 | 5.3 MEDIUM | No protection against brute-force attacks |
| CVE-2025-49191 | 4.8 MEDIUM | Dashboards and iFrames can link malicious web content |
| CVE-2025-49190 | 4.3 MEDIUM | Server-Side Request Forgery |
| CVE-2025-49192 | 4.3 MEDIUM | Clickjacking |
| CVE-2025-49193 | 4.2 MEDIUM | Missing HTTP Security Headers |
| CVE-2025-49198 | 3.1 LOW | Poor quality of randomness in authorization tokens |
No comments yet