CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

sick

media_server

10 known vulnerabilities · sorted by CVSS score

CVE-2025-49181
HIGH8.6

Due to missing authorization of an API endpoint, unauthorized users can send HTTP GET requests to gather sensitive information. An attacker could also send HTTP POST requests to modify the log files’ root path as well as the TCP ports the service is running on, leading to a Denial of Service attack.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49182
HIGH7.5

Files in the source code contain login credentials for the admin user and the property configuration password, allowing an attacker to get full access to the application.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49194
HIGH7.5

The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the credentials would be exposed.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49183
HIGH7.5

All communication with the REST API is unencrypted (HTTP), allowing an attacker to intercept traffic between an actor and the webserver. This leads to the possibility of information gathering and downloading media files.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49197
MEDIUM6.5

The application uses a weak password hash function, allowing an attacker to crack the weak password hash to gain access to an FTP user account.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49189
MEDIUM5.3

The HttpOnlyflag of the session cookie \"@@\" is set to false. Since this flag helps preventing access to cookies via client-side scripts, setting the flag to false can lead to a higher possibility of Cross-Side-Scripting attacks which target the stored cookies.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49195
MEDIUM5.3

The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.

sick / media_server
Network
Published Jun 12, 2025
CVE-2025-49192
MEDIUM4.3

The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user perceives. This could potentially reveal confidential information or allow others to take control of their computer while clicking on seemingly innocuous objects.

sick / field_analytics+1
Network
Published Jun 12, 2025
CVE-2025-49193
MEDIUM4.2

The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an iFrame (Clickjacking attacks) or not executing injected malicious JavaScript code (XSS attacks).

sick / baggage_analytics+5
Network
Published Jun 12, 2025
CVE-2025-49198
LOW3.1

The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.

sick / media_server
Network
Published Jun 12, 2025