Show filters
80 Total Results
Displaying 71-80 of 80
Sort by:
Attacker Value
Unknown

CVE-2021-32496

Disclosure Date: June 28, 2021 (last updated February 22, 2025)
SICK Visionary-S CX up version 5.21.2.29154R are vulnerable to an Inadequate Encryption Strength vulnerability concerning the internal SSH interface solely used by SICK for recovering returned devices. The use of weak ciphers make it easier for an attacker to break the security that protects information transmitted from the client to the SSH server, assuming the attacker has access to the network on which the device is connected. This can increase the risk that encryption will be compromised, leading to the exposure of sensitive user information and man-in-the-middle attacks.
Attacker Value
Unknown

CVE-2021-25926

Disclosure Date: April 12, 2021 (last updated February 22, 2025)
In SiCKRAGE, versions 9.3.54.dev1 to 10.0.11.dev1 are vulnerable to Reflected Cross-Site-Scripting (XSS) due to user input not being validated properly in the `quicksearch` feature. Therefore, an attacker can steal a user's sessionID to masquerade as a victim user, to carry out any actions in the context of the user.
Attacker Value
Unknown

CVE-2021-25925

Disclosure Date: April 12, 2021 (last updated February 22, 2025)
in SiCKRAGE, versions 4.2.0 to 10.0.11.dev1 are vulnerable to Stored Cross-Site-Scripting (XSS) due to user input not being validated properly when processed by the server. Therefore, an attacker can inject arbitrary JavaScript code inside the application, and possibly steal a user’s sensitive information.
Attacker Value
Unknown

CVE-2020-2075

Disclosure Date: August 31, 2020 (last updated February 22, 2025)
Platform mechanism AutoIP allows remote attackers to reboot the device via a crafted packet in SICK AG solutions Bulkscan LMS111, Bulkscan LMS511, CLV62x – CLV65x, ICR890-3, LMS10x, LMS11x, LMS15x, LMS12x, LMS13x, LMS14x, LMS5xx, LMS53x, MSC800, RFH.
Attacker Value
Unknown

CVE-2020-2077

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
SICK Package Analytics software up to and including version V04.0.0 are vulnerable due to incorrect default permissions settings. An unauthorized attacker could read sensitive data from the system by querying for known files using the REST API directly.
Attacker Value
Unknown

CVE-2020-2076

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
SICK Package Analytics software up to and including version V04.0.0 are vulnerable to an authentication bypass by directly interfacing with the REST API. An attacker can send unauthorized requests, bypass current authentication controls presented by the application and could potentially write files without authentication.
Attacker Value
Unknown

CVE-2020-2078

Disclosure Date: July 29, 2020 (last updated February 21, 2025)
Passwords are stored in plain text within the configuration of SICK Package Analytics software up to and including V04.1.1. An authorized attacker could access these stored plaintext credentials and gain access to the ftp service. Storing a password in plaintext allows attackers to easily gain access to systems, potentially compromising personal information or other sensitive information.
Attacker Value
Unknown

CVE-2019-14753

Disclosure Date: September 24, 2019 (last updated November 27, 2024)
SICK FX0-GPNT00000 and FX0-GENT00000 devices through 3.4.0 have a Buffer Overflow
Attacker Value
Unknown

CVE-2019-10979

Disclosure Date: July 01, 2019 (last updated November 27, 2024)
SICK MSC800 all versions prior to Version 4.0, the affected firmware versions contain a hard-coded customer account password.
0
Attacker Value
Unknown

CVE-2018-9160

Disclosure Date: March 31, 2018 (last updated November 26, 2024)
SickRage before v2018.03.09-1 includes cleartext credentials in HTTP responses.
0