📦 Enterprise Analytics
by Sick
🔍 What is Enterprise Analytics?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This vulnerability exposes authentication credentials transmitted via URL parameters, which can be unintentionally stored in server logs, browser histories, or proxy caches. Any system using HTTP requ...
This vulnerability allows attackers to enumerate valid usernames by observing different error messages for incorrect passwords versus non-existent usernames during failed login attempts. This affects ...
This vulnerability allows attackers to perform brute-force attacks against authentication systems by attempting multiple login attempts without rate limiting. It affects any application or system that...
This vulnerability allows unauthenticated attackers to query an endpoint without proper authentication, enabling user enumeration attacks. It affects systems running vulnerable versions of SICK produc...
This vulnerability allows attackers to create arbitrary log entries via an unvalidated API endpoint. Attackers can falsify or dilute logs, compromising audit integrity and potentially hiding malicious...
This vulnerability allows attackers to send excessively large payloads during failed login attempts, which are then logged without validation. This could lead to log file exhaustion or denial of servi...