A remote, unauthorized attacker can brute force folders and files and read them like private keys or configurations, making the application vulnerable for gathering sensitive information.
| Software | From | Fixed in |
|---|---|---|
| sick / baggage_analytics | - | - |
| sick / logistic_diagnostic_analytics | - | - |
| sick / package_analytics | - | - |
| sick / tire_analytics | - | - |