2025-10-06 07:07:30
SICK AG
PUBLISHED
A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.