CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

sick

field_analytics

12 known vulnerabilities · sorted by CVSS score

CVE-2025-49199
HIGH8.8

The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the application by configuring the services in a way that they are unable to run, making the application unusable. They can redirect traffic that is meant to be internal to their own hosted services and gathering information.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49184
HIGH7.5

A remote unauthorized attacker may gather sensitive information of the application, due to missing authorization of configuration settings of the product.

sick / baggage_analytics+5
Network
Published Jun 12, 2025
CVE-2025-49200
MEDIUM6.5

The created backup files are unencrypted, making the application vulnerable for gathering sensitive information by downloading and decompressing the backup files.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49196
MEDIUM6.5

A service supports the use of a deprecated and unsafe TLS version. This could be exploited to expose sensitive information, modify data in unexpected ways or spoof identities of other users or devices, affecting the confidentiality and integrity of the device.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49185
MEDIUM5.5

The web application is susceptible to cross-site-scripting attacks. An attacker who can create new dashboard widgets can inject malicious JavaScript code into the Transform Function which will be executed when the widget receives data from its data source.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49186
MEDIUM5.3

The product does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks.

avaya / media_server+5
Network
Published Jun 12, 2025
CVE-2025-49188
MEDIUM5.3

The application sends user credentials as URL parameters instead of POST bodies, making it vulnerable to information gathering.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49187
MEDIUM5.3

For failed login attempts, the application returns different error messages depending on whether the login failed due to an incorrect password or a non-existing username. This allows an attacker to guess usernames until they find an existing one.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49191
MEDIUM4.8

Linked URLs during the creation of iFrame widgets and dashboards are vulnerable to code execution. The URLs get embedded as iFrame widgets, making it possible to attack other users that access the dashboard by including malicious code. The attack is only possible if the attacker is authorized to create new dashboards or iFrame widgets.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49190
MEDIUM4.3

The application is vulnerable to Server-Side Request Forgery (SSRF). An endpoint can be used to send server internal requests to other ports.

sick / field_analytics
Network
Published Jun 12, 2025
CVE-2025-49192
MEDIUM4.3

The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.

sick / field_analytics+1
Network
Published Jun 12, 2025
CVE-2025-49193
MEDIUM4.2

The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).

sick / baggage_analytics+5
Network
Published Jun 12, 2025