NA - CVE-2025-49192 - The web application is vulnerable to...
The web application is vulnerable to clickjacking attacks. The site can be embedded into another frame, allowing an attacker to trick a user into clicking on something different from what the user...
NA - CVE-2025-49193 - The application fails to implement several...
The application fails to implement several security headers. These headers help increase the overall security level of the web application by e.g., preventing the application to be displayed in an...
NA - CVE-2025-49194 - The server supports authentication methods in...
The server supports authentication methods in which credentials are sent in plaintext over unencrypted channels. If an attacker were to intercept traffic between a client and this server, the...
NA - CVE-2025-49195 - The FTP server’s login mechanism does not...
The FTP server’s login mechanism does not restrict authentication attempts, allowing an attacker to brute-force user passwords and potentially compromising the FTP server.
NA - CVE-2025-49196 - A service supports the use of a deprecated and...
A service supports the use of a deprecated and unsafe TLS version. This could be exploited to expose sensitive information, modify data in unexpected ways or spoof identities of other users or...
NA - CVE-2025-49198 - The Media Server’s authorization tokens have a...
The Media Server’s authorization tokens have a poor quality of randomness. An attacker may be able to guess the token of an active user by computing plausible tokens.
NA - CVE-2025-49199 - The backup ZIPs are not signed by the...
The backup ZIPs are not signed by the application, leading to the possibility that an attacker can download a backup ZIP, modify and re-upload it. This allows the attacker to disrupt the...
NA - CVE-2025-49200 - The created backup files are unencrypted,...
The created backup files are unencrypted, making the application vulnerable for gathering sensitive information by downloading and decompressing the backup files.