SICK
CVE Severity Distribution (All Time)
Timeline Overview
Recent CVEs
View allLua apps can be deployed, removed, started, reloaded or stopped without authorization via AppManager. This allows an attacker to remove legitimate ap…
Unauthenticated CROWN APIs allow access to critical functions. This leads to the accessibility of large parts of the web application without authenti…
The product is vulnerable to pass-the-hash attacks in combination with hardcoded credentials of hidden user levels. This means that an attacker can l…
Since the firmware update is not validated, an attacker can install modified firmware on the device. This has a high impact on the availabilty, integ…
Due to missing input validation during one step of the firmware update process, the product is vulnerable to remote code execution. With network acce…