Sick

Media Server

8 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.06%
  • Veröffentlicht 12.06.2025 14:24:55
  • Zuletzt bearbeitet 26.01.2026 19:27:02

The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.

  • EPSS 0.05%
  • Veröffentlicht 12.06.2025 14:23:04
  • Zuletzt bearbeitet 26.01.2026 19:27:39

The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.

  • EPSS 0.15%
  • Veröffentlicht 12.06.2025 14:19:21
  • Zuletzt bearbeitet 26.01.2026 19:28:52

The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.

  • EPSS 0.07%
  • Veröffentlicht 12.06.2025 14:17:36
  • Zuletzt bearbeitet 26.01.2026 19:29:18

The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed.

  • EPSS 0.06%
  • Veröffentlicht 12.06.2025 14:15:07
  • Zuletzt bearbeitet 26.01.2026 19:30:49

The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing inject...

  • EPSS 0.05%
  • Veröffentlicht 12.06.2025 13:21:57
  • Zuletzt bearbeitet 29.01.2026 17:59:18

All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files.

  • EPSS 0.1%
  • Veröffentlicht 12.06.2025 13:15:02
  • Zuletzt bearbeitet 29.01.2026 17:59:50

Files in the source code contain login credentials for the admin user and the property configuration password, allowing an attacker to get full access to the application.

  • EPSS 0.28%
  • Veröffentlicht 12.06.2025 13:14:07
  • Zuletzt bearbeitet 03.02.2026 14:35:29

Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files’ root path as well as the TCP ports the service is ...