Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| SICK AG | SICK Field Analytics | all versions | - |
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2025-49199 | 8.8 HIGH | Backup files can be modified and uploaded |
| CVE-2025-49181 | 8.6 HIGH | Configurations endpoint does not require authorization |
| CVE-2025-49194 | 7.5 HIGH | Unencrypted communication |
| CVE-2025-49182 | 7.5 HIGH | Credential disclosure |
| CVE-2025-49183 | 7.5 HIGH | Unencrypted communication (HTTP) |
| CVE-2025-49184 | 7.5 HIGH | Information disclosure to unauthorized user |
| CVE-2025-49197 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49196 | 6.5 MEDIUM | Deprecated TLS version supported |
| CVE-2025-49185 | 5.5 MEDIUM | Stored Cross-Site-Script |
| CVE-2025-49195 | 5.3 MEDIUM | No protection against brute-force attacks |
| CVE-2025-49189 | 5.3 MEDIUM | Cookie missing HttpOnly flag |
| CVE-2025-49188 | 5.3 MEDIUM | Sensitive Data in URL |
| CVE-2025-49187 | 5.3 MEDIUM | User enumeration |
| CVE-2025-49186 | 5.3 MEDIUM | No brute-force protection |
| CVE-2025-49191 | 4.8 MEDIUM | Dashboards and iFrames can link malicious web content |
| CVE-2025-49190 | 4.3 MEDIUM | Server-Side Request Forgery |
| CVE-2025-49192 | 4.3 MEDIUM | Clickjacking |
| CVE-2025-49193 | 4.2 MEDIUM | Missing HTTP Security Headers |
| CVE-2025-49198 | 3.1 LOW | Poor quality of randomness in authorization tokens |
No comments yet