Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2023-35696

Summary
Assigner-SICK AG
Assigner Org ID-a6863dd2-93fc-443d-bef1-79f0b5020988
Published At-10 Jul, 2023 | 09:32
Updated At-12 Nov, 2024 | 14:38
Rejected At-
Credits

Unauthenticated endpoints in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the device via HTTP requests.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:SICK AG
Assigner Org ID:a6863dd2-93fc-443d-bef1-79f0b5020988
Published At:10 Jul, 2023 | 09:32
Updated At:12 Nov, 2024 | 14:38
Rejected At:
â–¼CVE Numbering Authority (CNA)

Unauthenticated endpoints in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the device via HTTP requests.

Affected Products
Vendor
SICK AGSICK AG
Product
ICR890-4
Default Status
affected
Versions
Affected
  • From 0 before 2.5.0 (*)
Problem Types
TypeCWE IDDescription
CWECWE-668CWE-668 Exposure of Resource to Wrong Sphere
Type: CWE
CWE ID: CWE-668
Description: CWE-668 Exposure of Resource to Wrong Sphere
Metrics
VersionBase scoreBase severityVector
3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

The recommended solution is to update the firmware to a version >= V2.5.0 as soon as possible.

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sick.com/psirt
issue-tracking
https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.pdf
vendor-advisory
https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.json
x_csaf
Hyperlink: https://sick.com/psirt
Resource:
issue-tracking
Hyperlink: https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.pdf
Resource:
vendor-advisory
Hyperlink: https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.json
Resource:
x_csaf
â–¼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sick.com/psirt
issue-tracking
x_transferred
https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.pdf
vendor-advisory
x_transferred
https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.json
x_csaf
x_transferred
Hyperlink: https://sick.com/psirt
Resource:
issue-tracking
x_transferred
Hyperlink: https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.pdf
Resource:
vendor-advisory
x_transferred
Hyperlink: https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.json
Resource:
x_csaf
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Vendor
SICK AGsick_ag
Product
icr890-4
CPEs
  • cpe:2.3:a:sick_ag:icr890-4:*:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • From 0 before 2.5.0 (custom)
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@sick.de
Published At:10 Jul, 2023 | 16:15
Updated At:17 Jul, 2023 | 17:53

Unauthenticated endpoints in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the device via HTTP requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Secondary3.17.5HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Primary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Type: Secondary
Version: 3.1
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CPE Matches

SICK AG
sick
>>icr890-4>>-
cpe:2.3:h:sick:icr890-4:-:*:*:*:*:*:*:*
SICK AG
sick
>>icr890-4_firmware>>Versions before 2.5.0(exclusive)
cpe:2.3:o:sick:icr890-4_firmware:*:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-668Primarynvd@nist.gov
CWE-668Secondarypsirt@sick.de
CWE ID: CWE-668
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-668
Type: Secondary
Source: psirt@sick.de
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.jsonpsirt@sick.de
Vendor Advisory
https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.pdfpsirt@sick.de
Vendor Advisory
https://sick.com/psirtpsirt@sick.de
Product
Hyperlink: https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.json
Source: psirt@sick.de
Resource:
Vendor Advisory
Hyperlink: https://sick.com/.well-known/csaf/white/2023/sca-2023-0006.pdf
Source: psirt@sick.de
Resource:
Vendor Advisory
Hyperlink: https://sick.com/psirt
Source: psirt@sick.de
Resource:
Product

Change History

0
Information is not available yet

Similar CVEs

102Records found

CVE-2023-3270
Matching Score-10
Assigner-SICK AG
ShareView Details
Matching Score-10
Assigner-SICK AG
CVSS Score-8.6||HIGH
EPSS-0.30% / 53.53%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 09:18
Updated-12 Nov, 2024 | 14:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of Sensitive Information to an Unauthorized Actor in the SICK ICR890-4 could allow an unauthenticated remote attacker to retrieve sensitive information about the system.

Action-Not Available
Vendor-SICK AG
Product-icr890-4icr890-4_firmwareICR890-4icr890-4
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2025-27594
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.10% / 25.99%
||
7 Day CHG~0.00%
Published-14 Mar, 2025 | 12:50
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted transmission of password hash

The device uses an unencrypted, proprietary protocol for communication. Through this protocol, configuration data is transmitted and device authentication is performed. An attacker can thereby intercept the authentication hash and use it to log into the device using a pass-the-hash attack.

Action-Not Available
Vendor-SICK AG
Product-SICK DL100-2xxxxxxx
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-3271
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-8.2||HIGH
EPSS-0.22% / 44.34%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 09:26
Updated-12 Nov, 2024 | 14:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in the SICK ICR890-4 could allow an unauthenticated remote attacker to gather information about the system and download data via the REST API by accessing unauthenticated endpoints.

Action-Not Available
Vendor-SICK AG
Product-icr890-4icr890-4_firmwareICR890-4icr890-4
CWE ID-CWE-284
Improper Access Control
CVE-2020-2077
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.21% / 42.95%
||
7 Day CHG~0.00%
Published-29 Jul, 2020 | 13:18
Updated-04 Aug, 2024 | 06:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

SICK Package Analytics software up to and including version V04.0.0 are vulnerable due to incorrect default permissions settings. An unauthorized attacker could read sensitive data from the system by querying for known files using the REST API directly.

Action-Not Available
Vendor-n/aSICK AG
Product-package_analyticsSICK Package Analytics
CWE ID-CWE-276
Incorrect Default Permissions
CVE-2023-35697
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.34% / 56.72%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 09:35
Updated-12 Nov, 2024 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Restriction of Excessive Authentication Attempts in the SICK ICR890-4 could allow a remote attacker to brute-force user credentials.

Action-Not Available
Vendor-SICK AG
Product-icr890-4icr890-4_firmwareICR890-4icr890-4
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-58590
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.19%
||
7 Day CHG+0.02%
Published-06 Oct, 2025 | 07:06
Updated-27 Jan, 2026 | 19:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path traversal

It's possible to brute force folders and files, what can be used by an attacker to steal sensitve information.

Action-Not Available
Vendor-SICK AG
Product-logistic_diagnostic_analyticspackage_analyticstire_analyticsbaggage_analyticsPackage AnalyticsTire AnalyticsLogistic Diagnostic AnalyticsBaggage Analytics
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2023-3272
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.11% / 28.99%
||
7 Day CHG~0.00%
Published-10 Jul, 2023 | 09:27
Updated-12 Nov, 2024 | 14:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Transmission of Sensitive Information in the SICK ICR890-4 could allow a remote attacker to gather sensitive information by intercepting network traffic that is not encrypted.

Action-Not Available
Vendor-SICK AG
Product-icr890-4icr890-4_firmwareICR890-4icr890-4
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-31412
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.09% / 24.70%
||
7 Day CHG~0.00%
Published-24 Aug, 2023 | 18:15
Updated-09 Dec, 2024 | 14:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The LMS5xx uses weak hash generation methods, resulting in the creation of insecure hashs. If an attacker manages to retrieve the hash, it could lead to collision attacks and the potential retrieval of the password.

Action-Not Available
Vendor-SICK AG
Product-lms511_firmwarelms511lms500lms500_firmwarelms531_firmwarelms531LMS5xxlms5xx
CWE ID-CWE-916
Use of Password Hash With Insufficient Computational Effort
CVE-2023-31408
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.04% / 13.43%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 10:55
Updated-23 Jan, 2025 | 17:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cleartext Storage of Sensitive Information in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote attacker to potentially steal user credentials that are stored in the user’s browsers local storage via cross-site-scripting attacks.

Action-Not Available
Vendor-SICK AG
Product-ftmg-esn40sxx_firmwareftmg-esr40sxx_firmwareftmg-esd20axxftmg-esn40sxxftmg-esr50sxxftmg-esr40sxxftmg-esd15axx_firmwareftmg-esd25axx_firmwareftmg-esn50sxx_firmwareftmg-esd15axxftmg-esr50sxx_firmwareftmg-esn50sxxftmg-esd25axxftmg-esd20axx_firmwareSICK FTMG-ESD25AXX AIR FLOW SENSORSICK FTMG-ESD15AXX AIR FLOW SENSORSICK FTMG-ESR40SXX AIR FLOW SENSORSICK FTMG-ESN40SXX AIR FLOW SENSORSICK FTMG-ESD20AXX AIR FLOW SENSORSICK FTMG-ESN50SXX AIR FLOW SENSORSICK FTMG-ESR50SXX AIR FLOW SENSOR
CWE ID-CWE-312
Cleartext Storage of Sensitive Information
CVE-2025-49183
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.21% / 43.05%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 13:21
Updated-29 Jan, 2026 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted communication (HTTP)

All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files.

Action-Not Available
Vendor-SICK AG
Product-media_serverSICK Media Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2025-49182
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.47% / 64.56%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 13:15
Updated-29 Jan, 2026 | 17:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Credential disclosure

Files in the source code contain login credentials for the admin user and the property configuration password, allowing an attacker to get full access to the application.

Action-Not Available
Vendor-SICK AG
Product-media_serverSICK Media Server
CWE ID-CWE-540
Inclusion of Sensitive Information in Source Code
CVE-2025-49194
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.19% / 40.34%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 14:17
Updated-26 Jan, 2026 | 19:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted communication

The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed.

Action-Not Available
Vendor-SICK AG
Product-media_serverSICK Media Server
CWE ID-CWE-319
Cleartext Transmission of Sensitive Information
CVE-2023-23446
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.23% / 45.16%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 10:52
Updated-23 Jan, 2025 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to download files by using a therefore unpriviledged account via the REST interface.

Action-Not Available
Vendor-SICK AG
Product-ftmg-esn40sxx_firmwareftmg-esr40sxx_firmwareftmg-esd20axxftmg-esn40sxxftmg-esr50sxxftmg-esr40sxxftmg-esd15axx_firmwareftmg-esd25axx_firmwareftmg-esn50sxx_firmwareftmg-esd15axxftmg-esr50sxx_firmwareftmg-esn50sxxftmg-esd25axxftmg-esd20axx_firmwareSICK FTMG-ESD25AXX AIR FLOW SENSORSICK FTMG-ESD15AXX AIR FLOW SENSORSICK FTMG-ESR40SXX AIR FLOW SENSORSICK FTMG-ESN40SXX AIR FLOW SENSORSICK FTMG-ESD20AXX AIR FLOW SENSORSICK FTMG-ESN50SXX AIR FLOW SENSORSICK FTMG-ESR50SXX AIR FLOW SENSOR
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2023-23445
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.18%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 10:51
Updated-23 Jan, 2025 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Access Control in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows an unprivileged remote attacker to gain unauthorized access to data fields by using a therefore unpriviledged account via the REST interface.

Action-Not Available
Vendor-SICK AG
Product-ftmg-esn40sxx_firmwareftmg-esr40sxx_firmwareftmg-esd20axxftmg-esn40sxxftmg-esr50sxxftmg-esr40sxxftmg-esd15axx_firmwareftmg-esd25axx_firmwareftmg-esn50sxx_firmwareftmg-esd15axxftmg-esr50sxx_firmwareftmg-esn50sxxftmg-esd25axxftmg-esd20axx_firmwareSICK FTMG-ESD25AXX AIR FLOW SENSORSICK FTMG-ESD15AXX AIR FLOW SENSORSICK FTMG-ESR40SXX AIR FLOW SENSORSICK FTMG-ESN40SXX AIR FLOW SENSORSICK FTMG-ESD20AXX AIR FLOW SENSORSICK FTMG-ESN50SXX AIR FLOW SENSORSICK FTMG-ESR50SXX AIR FLOW SENSOR
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2026-22911
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 7.51%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 13:02
Updated-23 Jan, 2026 | 15:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Firmware update files may expose password hashes for system accounts, which could allow a remote attacker to recover credentials and gain unauthorized access to the device.

Action-Not Available
Vendor-SICK AG
Product-tdc-x401gltdc-x401gl_firmwareTDC-X401GL
CWE ID-CWE-522
Insufficiently Protected Credentials
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2026-22910
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.02% / 5.60%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 13:02
Updated-23 Jan, 2026 | 15:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The device is deployed with weak and publicly known default passwords for certain hidden user levels, increasing the risk of unauthorized access. This represents a high risk to the integrity of the system.

Action-Not Available
Vendor-SICK AG
Product-tdc-x401gltdc-x401gl_firmwareTDC-X401GL
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2026-22920
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-3.7||LOW
EPSS-0.02% / 5.60%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 13:09
Updated-23 Jan, 2026 | 18:36
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The device's passwords have not been adequately salted, making them vulnerable to password extraction attacks.

Action-Not Available
Vendor-SICK AG
Product-tdc-x401gltdc-x401gl_firmwareTDC-X401GL
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2026-22646
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 5.56%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 13:15
Updated-29 Jan, 2026 | 16:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain error messages returned by the application expose internal system details that should not be visible to end users, providing attackers with valuable reconnaissance information (like file paths, database errors, or software versions) that can be used to map the application's internal structure and discover other, more critical vulnerabilities.

Action-Not Available
Vendor-SICK AG
Product-incoming_goods_suiteIncoming Goods Suite
CWE ID-CWE-209
Generation of Error Message Containing Sensitive Information
CVE-2026-22644
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.03% / 8.54%
||
7 Day CHG~0.00%
Published-15 Jan, 2026 | 13:14
Updated-29 Jan, 2026 | 17:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Certain requests pass the authentication token in the URL as string query parameter, making it vulnerable to theft through server logs, proxy logs and Referer headers, which could allow an attacker to hijack the user's session and gain unauthorized access.

Action-Not Available
Vendor-SICK AG
Product-incoming_goods_suiteIncoming Goods Suite
CWE ID-CWE-598
Use of GET Request Method With Sensitive Query Strings
CVE-2025-9914
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 25.45%
||
7 Day CHG+0.01%
Published-06 Oct, 2025 | 06:45
Updated-29 Jan, 2026 | 01:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The credentials of the users stored in the system's local database can be used for the log in, making it possible for an attacker to gain unauthorized access. This could potentially affect the confidentiality of the application.

Action-Not Available
Vendor-SICK AG
Product-logistic_diagnostic_analyticstire_analyticsbaggage_analyticspackage_analyticsPackage AnalyticsTire AnalyticsLogistic Diagnostic AnalyticsBaggage Analytics
CWE ID-CWE-288
Authentication Bypass Using an Alternate Path or Channel
CVE-2025-59460
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.08% / 23.43%
||
7 Day CHG~0.00%
Published-27 Oct, 2025 | 10:10
Updated-03 Nov, 2025 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unsecure access configuration

The system is deployed in its default state, with configuration settings that do not comply with the latest best practices for restricting access. This increases the risk of unauthorised connections.

Action-Not Available
Vendor-SICK AG
Product-tloc100-100tloc100-100_firmwareTLOC100-100 with Firmware >=7.1.1TLOC100-100 with Firmware <7.1.1
CWE ID-CWE-1391
Use of Weak Credentials
CVE-2025-58591
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-6.5||MEDIUM
EPSS-0.13% / 32.19%
||
7 Day CHG+0.02%
Published-06 Oct, 2025 | 07:07
Updated-27 Jan, 2026 | 19:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Path Traversal

A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.

Action-Not Available
Vendor-SICK AG
Product-logistic_diagnostic_analyticspackage_analyticstire_analyticsbaggage_analyticsPackage AnalyticsTire AnalyticsLogistic Diagnostic AnalyticsBaggage Analytics
CWE ID-CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CVE-2025-58584
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.09% / 25.20%
||
7 Day CHG+0.01%
Published-06 Oct, 2025 | 07:01
Updated-27 Jan, 2026 | 16:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Plain Text Transmission of Username and Password in the URL

In the HTTP request, the username and password are transferred directly in the URL as parameters. However, URLs can be stored in various systems such as server logs, browser histories or proxy servers. As a result, there is a high risk that this sensitive data will be disclosed unintentionally.

Action-Not Available
Vendor-SICK AG
Product-package_analyticsbaggage_analyticstire_analyticsenterprise_analyticslogistic_diagnostic_analyticsEnterprise AnalyticsLogistic Diagnostic AnalyticsPackage AnalyticsBaggage AnalyticsTire Analytics
CWE ID-CWE-598
Use of GET Request Method With Sensitive Query Strings
CVE-2025-58585
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.12% / 30.85%
||
7 Day CHG+0.02%
Published-06 Oct, 2025 | 07:01
Updated-27 Jan, 2026 | 19:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive Information Disclosure Through Missing Authentication

Multiple endpoints with sensitive information do not require authentication, making the application susceptible to information gathering.

Action-Not Available
Vendor-SICK AG
Product-logistic_diagnostic_analyticspackage_analyticstire_analyticsbaggage_analyticsPackage AnalyticsTire AnalyticsLogistic Diagnostic AnalyticsBaggage Analytics
CWE ID-CWE-497
Exposure of Sensitive System Information to an Unauthorized Control Sphere
CVE-2025-49188
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.39% / 60.27%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 14:02
Updated-29 Jan, 2026 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sensitive Data in URL

The application sends user credentials as URL parameters instead of POST bodies, making it vulnerable to information gathering.

Action-Not Available
Vendor-SICK AG
Product-field_analyticsSICK Field Analytics
CWE ID-CWE-598
Use of GET Request Method With Sensitive Query Strings
CVE-2025-49198
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-3.1||LOW
EPSS-0.29% / 52.73%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 14:24
Updated-26 Jan, 2026 | 19:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Poor quality of randomness in authorization tokens

The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.

Action-Not Available
Vendor-SICK AG
Product-media_serverSICK Media Server
CWE ID-CWE-330
Use of Insufficiently Random Values
CVE-2023-43699
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.20% / 41.53%
||
7 Day CHG~0.00%
Published-09 Oct, 2023 | 11:59
Updated-09 Dec, 2024 | 13:54
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper Restriction of Excessive Authentication Attempts in RDT400 in SICK APU allows an unprivileged remote attacker to guess the password via trial-and-error as the login attempts are not limited.

Action-Not Available
Vendor-SICK AG
Product-apu0200apu0200_firmwareAPU0200apu0200
CWE ID-CWE-307
Improper Restriction of Excessive Authentication Attempts
CVE-2025-49200
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-6.5||MEDIUM
EPSS-0.30% / 53.62%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 14:27
Updated-26 Jan, 2026 | 19:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Unencrypted backup contains sensitive information

The created backup files are unencrypted, making the application vulnerable for gathering sensitive information by downloading and decompressing the backup files.

Action-Not Available
Vendor-SICK AG
Product-field_analyticsSICK Field Analytics
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-49184
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-7.5||HIGH
EPSS-0.39% / 60.28%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 13:24
Updated-29 Jan, 2026 | 17:58
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Information disclosure to unauthorized user

A remote unauthorized attacker may gather sensitive information of the application, due to missing authorization of configuration settings of the product.

Action-Not Available
Vendor-SICK AG
Product-logistic_diagnostic_analyticstire_analyticsbaggage_analyticspackage_analyticsenterprise_analyticsfield_analyticsEnterprise AnalyticsLogistic Diagnostic AnalyticsPackage AnalyticsBaggage AnalyticsTire AnalyticsField Analytics
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2025-49197
Matching Score-8
Assigner-SICK AG
ShareView Details
Matching Score-8
Assigner-SICK AG
CVSS Score-6.5||MEDIUM
EPSS-0.16% / 36.52%
||
7 Day CHG~0.00%
Published-12 Jun, 2025 | 14:23
Updated-26 Jan, 2026 | 19:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Deprecated TLS version supported

The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.

Action-Not Available
Vendor-SICK AG
Product-media_serverSICK Media Server
CWE ID-CWE-328
Use of Weak Hash
CVE-2023-23448
Matching Score-6
Assigner-SICK AG
ShareView Details
Matching Score-6
Assigner-SICK AG
CVSS Score-5.3||MEDIUM
EPSS-0.18% / 39.34%
||
7 Day CHG~0.00%
Published-15 May, 2023 | 10:53
Updated-23 Jan, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Inclusion of Sensitive Information in Source Code in SICK FTMg AIR FLOW SENSOR with Partnumbers 1100214, 1100215, 1100216, 1120114, 1120116, 1122524, 1122526 allows a remote attacker to gain information about valid usernames via analysis of source code.

Action-Not Available
Vendor-SICK AG
Product-ftmg-esn40sxx_firmwareftmg-esr40sxx_firmwareftmg-esd20axxftmg-esn40sxxftmg-esr50sxxftmg-esr40sxxftmg-esd15axx_firmwareftmg-esd25axx_firmwareftmg-esn50sxx_firmwareftmg-esd15axxftmg-esr50sxx_firmwareftmg-esn50sxxftmg-esd25axxftmg-esd20axx_firmwareSICK FTMG-ESD25AXX AIR FLOW SENSORSICK FTMG-ESD15AXX AIR FLOW SENSORSICK FTMG-ESR40SXX AIR FLOW SENSORSICK FTMG-ESN40SXX AIR FLOW SENSORSICK FTMG-ESD20AXX AIR FLOW SENSORSICK FTMG-ESN50SXX AIR FLOW SENSORSICK FTMG-ESR50SXX AIR FLOW SENSOR
CWE ID-CWE-540
Inclusion of Sensitive Information in Source Code
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-30732
Matching Score-4
Assigner-Samsung Mobile
ShareView Details
Matching Score-4
Assigner-Samsung Mobile
CVSS Score-5.5||MEDIUM
EPSS-0.21% / 43.67%
||
7 Day CHG~0.00%
Published-07 Jun, 2022 | 18:14
Updated-03 Aug, 2024 | 06:56
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Exposure of Sensitive Information vulnerability in Samsung Account prior to version 13.2.00.6 allows attacker to access sensitive information via onActivityResult.

Action-Not Available
Vendor-SamsungSamsung Electronics
Product-accountSamsung Account
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2023-7204
Matching Score-4
Assigner-WPScan
ShareView Details
Matching Score-4
Assigner-WPScan
CVSS Score-7.5||HIGH
EPSS-0.22% / 44.02%
||
7 Day CHG~0.00%
Published-29 Jan, 2024 | 14:44
Updated-11 Jun, 2025 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
WP STAGING WordPress Backup Plugin < 3.2.0 - Unauthorized Sensitive Data Exposure

The WP STAGING WordPress Backup plugin before 3.2.0 allows access to cache files during the cloning process which provides

Action-Not Available
Vendor-wp-stagingUnknown
Product-wp_stagingWP STAGING WordPress Backup Plugin
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CVE-2020-28145
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.30% / 52.94%
||
7 Day CHG~0.00%
Published-12 Oct, 2021 | 10:21
Updated-04 Aug, 2024 | 16:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Arbitrary file deletion vulnerability was discovered in wuzhicms v 4.0.1 via coreframe\app\attachment\admin\index.php, which allows attackers to access sensitive information.

Action-Not Available
Vendor-wuzhicmsn/a
Product-wuzhicmsn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2023-7014
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-5.3||MEDIUM
EPSS-0.66% / 71.24%
||
7 Day CHG-0.02%
Published-05 Feb, 2024 | 21:21
Updated-08 Apr, 2026 | 18:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Author Box, Guest Author and Co-Authors for Your Posts – Molongui <= 4.7.4 - Information Exposure via ma_debug

The Author Box, Guest Author and Co-Authors for Your Posts – Molongui plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.7.4 via the 'ma_debu' parameter. This makes it possible for unauthenticated attackers to extract sensitive data including post author emails and names if applicable.

Action-Not Available
Vendor-amitzymolongui
Product-molongui_authorshipMolongui Authorship – Author Boxes, Guest Authors & Co-Authors for WordPress
CWE ID-CWE-359
Exposure of Private Personal Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2020-18754
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 51.78%
||
7 Day CHG~0.00%
Published-13 Aug, 2021 | 16:08
Updated-04 Aug, 2024 | 14:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An information disclosure vulnerability exists within Dut Computer Control Engineering Co.'s PLC MAC1100.

Action-Not Available
Vendor-dccen/a
Product-mac1100_plc_firmwaremac1100_plcn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-25481
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-4||MEDIUM
EPSS-9.50% / 92.86%
||
7 Day CHG~0.00%
Published-20 Mar, 2022 | 00:00
Updated-03 Aug, 2024 | 04:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

ThinkPHP Framework v5.0.24 was discovered to be configured without the PATHINFO parameter. This allows attackers to access all system environment parameters from index.php. NOTE: this is disputed by a third party because system environment exposure is an intended feature of the debugging mode.

Action-Not Available
Vendor-thinkphpn/athinkphp
Product-thinkphpn/athinkphp
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-24975
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.96% / 76.50%
||
7 Day CHG~0.00%
Published-11 Feb, 2022 | 00:00
Updated-03 Aug, 2024 | 04:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The --mirror documentation for Git through 2.35.1 does not mention the availability of deleted content, aka the "GitBleed" issue. This could present a security risk if information-disclosure auditing processes rely on a clone operation without the --mirror option. Note: This has been disputed by multiple 3rd parties who believe this is an intended feature of the git binary and does not pose a security risk.

Action-Not Available
Vendor-git-scmn/a
Product-gitn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2022-22732
Matching Score-4
Assigner-Schneider Electric
ShareView Details
Matching Score-4
Assigner-Schneider Electric
CVSS Score-3.9||LOW
EPSS-0.21% / 42.69%
||
7 Day CHG~0.00%
Published-30 Jan, 2023 | 00:00
Updated-05 Feb, 2025 | 20:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A CWE-668: Exposure of Resource to Wrong Sphere vulnerability exists that could cause all remote domains to access the resources (data) supplied by the server when an attacker sends a fetch request from third-party site or malicious site. Affected Products: EcoStruxure Power Commission (Versions prior to V2.22)

Action-Not Available
Vendor-Schneider Electric SE
Product-ecostruxure_power_commissionEcoStruxure Power Commission
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-46354
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-39.20% / 97.30%
||
7 Day CHG+4.54%
Published-09 Feb, 2022 | 13:10
Updated-04 Aug, 2024 | 05:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Thinfinity VirtualUI 2.1.28.0, 2.1.32.1 and 2.5.26.2, fixed in version 3.0 is affected by an information disclosure vulnerability in the parameter "Addr" in cmd site. The ability to send requests to other systems can allow the vulnerable server to filtrate the real IP of the web server or increase the attack surface.

Action-Not Available
Vendor-cybelesoftn/a
Product-thinfinity_virtualuin/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-45708
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.37%
||
7 Day CHG~0.00%
Published-26 Dec, 2021 | 21:47
Updated-04 Aug, 2024 | 04:47
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in the abomonation crate through 2021-10-17 for Rust. Because transmute operations are insufficiently constrained, there can be an information leak or ASLR bypass.

Action-Not Available
Vendor-abomonation_projectn/a
Product-abomonationn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-44522
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-7.5||HIGH
EPSS-0.43% / 62.70%
||
7 Day CHG~0.00%
Published-14 Dec, 2021 | 12:07
Updated-04 Aug, 2024 | 04:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability has been identified in SiPass integrated V2.76 (All versions), SiPass integrated V2.80 (All versions), SiPass integrated V2.85 (All versions), Siveillance Identity V1.5 (All versions), Siveillance Identity V1.6 (All versions < V1.6.284.0). Affected applications insufficiently limit the access to the internal message broker system. This could allow an unauthenticated remote attacker to subscribe to arbitrary message queues.

Action-Not Available
Vendor-Siemens AG
Product-sipass_integratedsiveillance_identitySiveillance Identity V1.5SiPass integrated V2.80SiPass integrated V2.85SiPass integrated V2.76Siveillance Identity V1.6
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-42641
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.80% / 74.06%
||
7 Day CHG~0.00%
Published-02 Feb, 2022 | 17:21
Updated-04 Aug, 2024 | 03:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

PrinterLogic Web Stack versions 19.1.1.13 SP9 and below are vulnerable to an Insecure Direct Object Reference (IDOR) vulnerability that allows an unauthenticated attacker to disclose the username and email address of all users.

Action-Not Available
Vendor-printerlogicn/a
Product-web_stackn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2023-37599
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-85.61% / 99.38%
||
7 Day CHG~0.00%
Published-13 Jul, 2023 | 00:00
Updated-05 Nov, 2024 | 16:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue in issabel-pbx v.4.0.0-6 allows a remote attacker to obtain sensitive information via the modules directory

Action-Not Available
Vendor-issabeln/a
Product-pbxn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-40639
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.29% / 52.40%
||
7 Day CHG~0.00%
Published-15 Sep, 2021 | 21:17
Updated-04 Aug, 2024 | 02:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Improper access control in Jfinal CMS 5.1.0 allows attackers to access sensitive information via /classes/conf/db.properties&config=filemanager.config.js.

Action-Not Available
Vendor-jflyfoxn/a
Product-jfinal_cmsn/a
CWE ID-CWE-863
Incorrect Authorization
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-39971
Matching Score-4
Assigner-Huawei Technologies
ShareView Details
Matching Score-4
Assigner-Huawei Technologies
CVSS Score-7.5||HIGH
EPSS-0.15% / 35.17%
||
7 Day CHG~0.00%
Published-03 Jan, 2022 | 21:07
Updated-04 Aug, 2024 | 02:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Password vault has a External Control of System or Configuration Setting vulnerability.Successful exploitation of this vulnerability could compromise confidentiality.

Action-Not Available
Vendor-Huawei Technologies Co., Ltd.
Product-harmonyosHarmonyOS
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-38712
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-0.24% / 46.80%
||
7 Day CHG~0.00%
Published-16 Aug, 2021 | 03:35
Updated-04 Aug, 2024 | 01:51
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

OneNav 0.9.12 allows Information Disclosure of the onenav.db3 contents. NOTE: the vendor's recommended solution is to block the access via an NGINX configuration file.

Action-Not Available
Vendor-onenavn/a
Product-onenavn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-36198
Matching Score-4
Assigner-Johnson Controls
ShareView Details
Matching Score-4
Assigner-Johnson Controls
CVSS Score-8.3||HIGH
EPSS-0.20% / 41.16%
||
7 Day CHG~0.00%
Published-06 Dec, 2021 | 16:54
Updated-16 Sep, 2024 | 16:38
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Entrapass

Successful exploitation of this vulnerability could allow an unauthorized user to access sensitive data.

Action-Not Available
Vendor-johnsoncontrolsJohnson Controls
Product-kantech_entrapassEntrapass
CWE ID-CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2018-6910
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-90.55% / 99.62%
||
7 Day CHG~0.00%
Published-13 Feb, 2018 | 21:00
Updated-05 Aug, 2024 | 06:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

DedeCMS 5.7 allows remote attackers to discover the full path via a direct request for include/downmix.inc.php or inc/inc_archives_functions.php.

Action-Not Available
Vendor-n/aDedeCMS
Product-dedecmsn/a
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
CVE-2021-31407
Matching Score-4
Assigner-Vaadin Ltd.
ShareView Details
Matching Score-4
Assigner-Vaadin Ltd.
CVSS Score-8.6||HIGH
EPSS-1.80% / 82.89%
||
7 Day CHG~0.00%
Published-23 Apr, 2021 | 16:05
Updated-16 Sep, 2024 | 17:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Server classes and resources exposure in OSGi applications using Vaadin 12-14 and 19

Vulnerability in OSGi integration in com.vaadin:flow-server versions 1.2.0 through 2.4.7 (Vaadin 12.0.0 through 14.4.9), and 6.0.0 through 6.0.1 (Vaadin 19.0.0) allows attacker to access application classes and resources on the server via crafted HTTP request.

Action-Not Available
Vendor-vaadinVaadin
Product-flowvaadinflow-serverVaadin
CWE ID-CWE-402
Transmission of Private Resources into a New Sphere ('Resource Leak')
CWE ID-CWE-668
Exposure of Resource to Wrong Sphere
  • Previous
  • 1
  • 2
  • 3
  • Next
Details not found