Show filters
80 Total Results
Displaying 71-80 of 80
Sort by:
Attacker Value
Unknown
CVE-2021-32496
Disclosure Date: June 28, 2021 (last updated February 22, 2025)
SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.
0
Attacker Value
Unknown
CVE-2021-25926
Disclosure Date: April 12, 2021 (last updated February 22, 2025)
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
0
Attacker Value
Unknown
CVE-2021-25925
Disclosure Date: April 12, 2021 (last updated February 22, 2025)
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
0
Attacker Value
Unknown
CVE-2020-2075
Disclosure Date: August 31, 2020 (last updated February 22, 2025)
Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.
0
Attacker Value
Unknown
CVE-2020-2077
Disclosure Date: July 29, 2020 (last updated February 21, 2025)
SICK Package Analytics software up to and including version V04.0.0 are vulnerable due to incorrect default permissions settings. An unauthorized attacker could read sensitive data from the system by querying for known files using the REST API directly.
0
Attacker Value
Unknown
CVE-2020-2076
Disclosure Date: July 29, 2020 (last updated February 21, 2025)
SICK Package Analytics software up to and including version V04.0.0 are vulnerable to an authentication bypass by directly interfacing with the REST API. An attacker can send unauthorized requests, bypass current authentication controls presented by the application and could potentially write files without authentication.
0
Attacker Value
Unknown
CVE-2020-2078
Disclosure Date: July 29, 2020 (last updated February 21, 2025)
Passwords are stored in plain text within the configuration of SICK Package Analytics software up to and including V04.1.1. An authorized attacker could access these stored plaintext credentials and gain access to the ftp service. Storing a password in plaintext allows attackers to easily gain access to systems, potentially compromising personal information or other sensitive information.
0
Attacker Value
Unknown
CVE-2019-14753
Disclosure Date: September 24, 2019 (last updated November 27, 2024)
SICK FX0-GPNT00000 and FX0-GENT00000 devices through 3.4.0 have a Buffer Overflow
0
Attacker Value
Unknown
CVE-2019-10979
Disclosure Date: July 01, 2019 (last updated November 27, 2024)
SICK MSC800 all versions prior to Version 4.0, the affected firmware versions contain a hard-coded customer account password.
0
Attacker Value
Unknown
CVE-2018-9160
Disclosure Date: March 31, 2018 (last updated November 26, 2024)
SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses.
0