Vulnerabilities
Vulnerable Software
The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).
CVSS Score
4.2
EPSS Score
0.001
Published
2025-06-12
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
CVSS Score
5.3
EPSS Score
0.001
Published
2025-06-12
A remote unauthorized attacker may gather sensitive information of the application, due to missing authorization of configuration settings of the product.
CVSS Score
7.5
EPSS Score
0.001
Published
2025-06-12
SICK Package Analytics software up to and including version V04.0.0 are vulnerable to an authentication bypass by directly interfacing with the REST API. An attacker can send unauthorized requests, bypass current authentication controls presented by the application and could potentially write files without authentication.
CVSS Score
9.8
EPSS Score
0.004
Published
2020-07-29
SICK Package Analytics software up to and including version V04.0.0 are vulnerable due to incorrect default permissions settings. An unauthorized attacker could read sensitive data from the system by querying for known files using the REST API directly.
CVSS Score
7.5
EPSS Score
0.002
Published
2020-07-29
Passwords are stored in plain text within the configuration of SICK Package Analytics software up to and including V04.1.1. An authorized attacker could access these stored plaintext credentials and gain access to the ftp service. Storing a password in plaintext allows attackers to easily gain access to systems, potentially compromising personal information or other sensitive information.
CVSS Score
6.5
EPSS Score
0.002
Published
2020-07-29


Contact Us

Shodan ® - All rights reserved