Vulnerabilities
Vulnerable Software
Sick:  Security Vulnerabilities
The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.
CVSS Score
8.8
EPSS Score
0.002
Published
2025-06-12
The created backup files are unencrypted, making the application vulnerable for gathering sensitive information by downloading and decompressing the backup files.
CVSS Score
6.5
EPSS Score
0.003
Published
2025-06-12
The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.
CVSS Score
4.3
EPSS Score
0.002
Published
2025-06-12
The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).
CVSS Score
4.2
EPSS Score
0.003
Published
2025-06-12
The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed.
CVSS Score
7.5
EPSS Score
0.002
Published
2025-06-12
The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.
CVSS Score
5.3
EPSS Score
0.004
Published
2025-06-12
A service supports the use of a deprecated and unsafe TLS version. This could be exploited to expose sensitive information, modify data in unexpected ways or spoof identities of other users or devices, affecting the confidentiality and integrity of the device.
CVSS Score
6.5
EPSS Score
0.002
Published
2025-06-12
The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.
CVSS Score
6.5
EPSS Score
0.002
Published
2025-06-12
The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.
CVSS Score
5.3
EPSS Score
0.003
Published
2025-06-12
For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.
CVSS Score
5.3
EPSS Score
0.004
Published
2025-06-12


Contact Us

Shodan ® - All rights reserved