- Home
- SICK Product Security Incident Response Team
- SICK PSIRT Acknowledgments
- Home
- SICK Product Security Incident Response Team
- SICK PSIRT Acknowledgments
SICK PSIRT Acknowledgments
SICK Product Security Incident Response Team
The SICK PSIRT would like to thank the following security researchers for the responsible disclosure of potential security issues related to the webservices or products of SICK. In good cooperation, they helped to improve and further strengthen security for our customers.
-
2025
-
2024
-
2023
URL Redirection to Untrusted Site ('Open Redirect')
Improper Restriction of Rendered UI Layers or Frames
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Authorization Bypass Through User-Controlled Key
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Uncontrolled Resource Consumption
Use of Hard-coded Credentials
Cleartext Transmission of Sensitive Information
Use of Weak Hash -
2022
-
2021
-
2020
-
2019
Contact
SICK PSIRT – cyber security contact for SICK products
Reports can be sent in German or English.